Sie sind auf Seite 1von 96

NETWORK VIDEO RECORDER

User Manual

XRN-410S/810S
Network Video Recorder
User Manual

Copyright
©2017 Hanwha Techwin Co., Ltd. All rights reserved.

Trademark
Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of
their respective company.

Restriction
Copyright of this document is reserved. Under no circumstances, this document shall be reproduced, distributed or changed, partially or wholly,
without formal authorization.

Disclaimer
Hanwha Techwin makes the best to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be
provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Hanwha Techwin reserves the right
to change the contents of this document without prior notice.

™ Design and specifications are subject to change without prior notice.

™ The initial administrator ID is “admin” and the password should be set when logging in for the first time.
Please change your password every three months to safely protect personal information and to prevent the damage of the
information theft.
Please, take note that it’s a user’s responsibility for the security and any other problems caused by mismanaging a password.
overview
IMPORTANT SAFETY INSTRUCTIONS BEFORE START
Read these operating instructions carefully before using the unit. This manual provides operational information necessary for using the product and contains a description about each
Follow all the safety instructions listed below. component part and its function as well as menu or network settings.
Keep these operating instructions handy for future reference. You have to keep in mind the following notices :
1) Read these instructions. • Hanwha Techwin retains the copyright on this manual.
2) Keep these instructions. • This manual cannot be copied without Hanwha Techwin's prior written approval.

● OVERVIEW
3) Heed all warnings. • We are not liable for any or all losses to the product incurred by your use of non-standard product or violation of
instructions mentioned in this manual.
4) Follow all instructions.
• Prior to opening the case, please consult a qualified technician first. Whenever this is needed power must be
5) Do not use this apparatus near water.
removed from the unit.
6) Clean the contaminated area on the product surface with a soft, dry cloth or a damp cloth.
• Before adding a hard disk drive or external storage (USB memory, USB HDD, etc), check if it is compliant with this
(Do not use a detergent or cosmetic products that contain alcohol, solvents or surfactants or oil
product. For the compatibility list, contact the retailer.
constituents as they may deform or cause damage to the product.)
7) Do not block any ventilation openings, Install in accordance with the manufacturer's instructions.
Warning
8) Do not install near any heat sources such as radiators, heat registers, stoves, or other apparatus (including
amplifiers) that produce heat.
Battery
9) Do not defeat the safety purpose of the polarized or grounding- type plug. A polarized plug has two blades
with one wider than the other. A grounding type plug has two blades and a third grounding prong. The It is essential that when changing the battery in the unit, the replacement battery must be of the same type
wide blade or the third prong are provided for your safety. if the provided plug does not fit into your outlet, otherwise there may be a possibility of an explosion.
consult an electrician for replacement of the obsolete outlet. The following are the specifications of the battery you are using now.
10) Protect the power cord from being walked on or pinched particularly at plugs, convenience receptacles, • Normal voltage : 3V
and the point where they exit from the apparatus. CALIFORNIA USA ONLY
• Normal capacity : 210mAh This Perchlorate warning applies only to primary CR (Manganese Dioxide)
11) Only use attachments/accessories specified by the manufacturer. Lithium coin cells in the product sold or distributed ONLY in California USA.
• Continuous standard load : 0.4mA "Perchlorate Material - special handling may apply,
12) Use only with the cart, stand, tripod, bracket, or table specified by the manufacturer, See www.dtsc.ca.gov/hazardouswaste/perchlorate."
or sold with the apparatus. When a cart is used, use caution when moving the cart/ • Operating temperature : -20°C ~ +60°C
apparatus combination to avoid injury from tip-over. (-4°F ~ +140°F)
13) Unplug this apparatus during lightning storms or when unused for long periods of
time. Caution
14) Refer all servicing to qualified service personnel. Servicing is required when the • Connect the power cord into a grounded outlet.
apparatus has been damaged in any way, such as power-supply cord or plug is
• The Mains plug is used as a disconnect device and shall stay readily operable at any time.
damaged, liquid has been spilled or objects have fallen into the apparatus, the apparatus has been
exposed to rain or moisture, does not operate normally, or has been dropped. • Batteries shall not be exposed to excessive heat such as sunshine, fire or the like.
• Risk of Explosion if Battery is replaced by an Incorrect Type. Dispose of Used Batteries According to the
Instructions.
Standards Approvals
System Shutdown
Turning off the power while the product is in operation, or undertaking improper actions may cause damage or
malfunction to the hard drive or the product.
` Any changes or modifications in construction of this device which are not expressly approved by the party responsible for Press <OK> on the system shutdown popup window and then remove the power cable to ensure a safe
J compliance could void the user's authority to operate the equipment. power off.
You may want to install a UPS system for safe operation in order to prevent damage caused by an unexpected
power stoppage. (Any questions concerning UPS, consult your UPS retailer.)
` This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may
M not cause harmful interference, and (2) this device must accept any interference received, including interference that may
` If powered off abnormally, restarting may take more time for restoring data from hard disk drive for proper operation.
cause undesired operation. J
` This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment.
This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the
instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.

English _3
overview
Operating Temperature
The guaranteed operating temperature range of this product is 0°C ~ 40°C (32°F ~ 104°F).
This product may not work properly if you run right after a long period of storage at a temperature below the
guaranteed one.
Prior to using a device that has been stored for a long period in low temperatures, allow the product to stand at
room temperature for a period.
Especially for the built-in HDD in the product, its guaranteed temperature range is 5°C ~ 55°C (41°F ~ 131°F).
Likewise, the hard drive may not work at a temperature below the guaranteed one.

Ethernet Port
This equipment is in door use and all the communication wirings are limited to inside of the building.

Security Precautions
The initial administrator ID is “admin” and the password should be set when logging in for the first time.
Please change your password every three months to safely protect personal information and to prevent the
damage of the information theft.
Please, take note that it’s a user’s responsibility for the security and any other problems caused by
mismanaging a password.

4_ overview
CONTENTS SEARCH & PLAY 51 Search
54 Playback

OVERVIEW 3
3
Important Safety Instructions
Before Start
51
3 5
6
Contents
Features
STARTING WEB VIEWER 55 What is Web Viewer?

● OVERVIEW
7 Part Names and Functions (Front) 55 Connecting Web Viewer
7
8
Part Names and Functions (Rear)
Remote Control
55
INSTALLATION 9 Checking the installation environment
9 Rack Installation LIVE VIEWER 57 Live Viewer

9 9 HDD Addition

57
58
61
Live Screen Configuration
Controlling a Connected Network Camera

CONNECTING WITH OTHER DEVICE 12 Connecting to an external device


12 Connecting the USB SEARCH VIEWER 63 Search Viewer

12 12
13
Connecting the Alarm Input/Output
Connecting the Network
63
LIVE 14 Getting Started
15 Live Screen Configuration SETUP VIEWER 66 Setup Viewer

14 18
21
21
Live Screen Mode
Zoom
Layout 66
22 Audio ON/OFF
22 Freeze
22 Event Monitoring BACKUP VIEWER 75 SEC Backup Viewer
22 Capture
23
23
23
Maintain the Screen Ratio
Display Text
PTZ control
75
25 Backup
APPENDIX 77 Product Specification
79 Product Overview

77
MENU SETUP 26 System Setup
80 Default Setting
31 Setting the Device

26 40
42
44
Setting the Recording
Setting the Event
Network Configuration
82
85
Troubleshooting
Open Source License Report on the Product

English _5
overview
FEATURES Package Contents
The product records video and audio from network cameras to a hard disk, and enables playback from the hard disk. Please unwrap the product, and place the product on a flat place or in the place to be installed.
It also provides remote monitoring environment for video and audio over the network using a remote computer. Please check the following contents are included in addition to the main unit.
• User-friendly UI  Accessory category and quantity may differ depending on sales region.
• Supports a range of 4K camera resolutions (4096X2160) XRN-410S
• Outputs a 4K high definition image using HDMI
• Record and play video
6)%
• Record and play audio USB
5(& /$1 32:(5

• Supports ONVIF Profile S standard and RTP / RTSP protocols


• Display the HDD operation status by HDD SMART
NVR Mouse Power Cable
• HDD overwrite enabled
• Backup using USB 2.0, 3.0 protocols and external HDD
• Simultaneous play of 4, 8 channels
• Various Search Modes (Time, Event, Smart, Text, Backup, ARB)
• ARB support (configuration feature for saving period by channel)
Power Adaptor User Manual CD User Manual or Quick Manual
• Various Recording Modes (Normal, Event, Scheduled Recording)
• Alarm Input / Output
• Remote Monitoring function by Windows Network Viewer
• Live monitoring of the network camera
• Installation Wizard Function (Easy Setup, Quick Setup)
HDD Fixing Screw SATA Cable
Terminal block
• Supports the smartphone remote monitoring feature by P2P support (For models having no installed HDD) (For models having no installed HDD)
• Provides smartphone event alarm (sending real-time event messages)
XRN-810S

'9 REC HDD ALARM NETWORK BACKUP POWER

1(7:25.9,'(25(&25'(5 6516

NVR Mouse Power Cable

Network Viewer Software /


User Manual or Quick Manual Terminal block
User Manual CD

Remote Control /
Bracket rack Bracket Fixing Screw
Remote Control Battery (AAA)

6_ overview
PART NAMES AND FUNCTIONS (FRONT) PART NAMES AND FUNCTIONS (REAR)

XRN-410S XRN-410S

VGA OUT
ALARM OUT

6)%
NO 1 3
ALARM 1 2 CONNECTION AUDIO VIEWER
IN OUT DC 54V
COM COM
1 2 3 4 NO NO NO G
HDMI USB

● OVERVIEW
2 4
USB
5(& /$1 32:(5
PoE
CAMERA

 b c  b c    
XRN-810S XRN-810S
'9 REC HDD ALARM NETWORK BACKUP POWER 3
ALARM AC 100
240~IN
1 7 OUT
5 ALARM   
$8',2 IN
9,(:(5 9*$287 287 &20 &20 &20
    12 1& 12 12 G
+'0, USB

1(7:25.9,'(25(&25'(5 6516
2 4 PoE 6 8
CAMERA

c b    cb  
Part Names Functions
Part Names Functions
 USB Connects the USB devices. (USB 2.0 supported) - ALARM IN : Alarm input ports. (1~4 CH)

b
Remote Reception
Receive the signal from the remote control.  ALARM
- ALARM OUT : Alarm output ports.
XRN-410S : 1~2 CH
System
XRN-810S : 1~3 CH
REC : Lights on when recording is in progress.
b AUDIO OUT Audio Signal Output Port (RCA jack).
HDD : Displays the normal access to HDD.
Terminal to connect a separate ground cable.
LED turns on when accessing the hard disk. (XRN-810S)
c Ground connection
` Add a ground cable to support the safe use of the device.
c LED Indicator ALARM : Lights on when an event occurs. (XRN-810S)

NETWORK (LAN) : Displays both network connection and data transfer status.  VIEWER Port recommended for connection with a network, web viewer.

BACKUP : Stays ON when backup is in operation. (XRN-810S)  VGA OUT VGA Video Signal Output Port.

POWER : Shows the power ON/OFF status.


 HDMI HDMI connector port.

 USB Connects the USB devices. (USB 3.0 supported)

 PoE (CAMERA) Power supply port to connect to a camera.

 Power Terminal to connect power to.

Power Switch Power on/off switch.

English _7
overview
REMOTE CONTROL Using the Numeric buttons
1. Select a number between 1 and 8.
2. Move to the selected channel number.

POWER REC Changing the Remote Control ID


Displays the Exit pop up screen. Starts or ends the live recording.

Remote control’s ID and NVR’s ID should be matched for proper operation.


1. Press the [ID] button of the remote control and check the ID displayed on the NVR screen.
The factory default ID of the remote control is 00.
NUMBER [0~+10]
Used as the numeric input keys, or displays a single 2. Enter 2 digits of your selection in order, while pressing the [ID] button of the remote control.
channel.
3. When ID input is done, press the [ID] button of the remote control again to check the setting.
ID
Sets the ID of the system.
PTZ Select 2 digits from 0 ~ 9 while pressing the ID Key.
` If you want to change the remote control ID to 08: Press 0 and 8 in order while the [ID] button of the remote control is
Displays or ends PTZ.
T/W SCROLL ,.
M pressed.
Zooms in or out. Moves the menu scroll.
For changing the ID of remote device, refer to “Remote Devices”. (Page 39)
VIEW
SEARCH Runs the View function in the PTZ mode.
Displays the search menu.

MODE BACKUP
Changes the screen mode. Displays the Backup Menu.

MENU RETURN
Display the live screen menu. Returns to the previous screen.

Up/Down/Left/Right(▲▼◄ ►)/ENTER
Moves the cursor up/down/left/right, and runs the
Select Menu.
PRESET
Displays the Preset Setup. REC LOCK
Selects the recording lock function.
FREEZE
Freezes the screen temporarily. AUDIO
ZOOM Turns Audio on/off.
Runs the digital zoom (x2) function. ALARM
Cancels the Alarm.
Skip Backward (by unit time),
Slow Rewind, Slow Forward, Move Frame
Skip Forward (by unit time) While paused, moves to the previous/next frame.

FR, STOP, PLAY/PAUSE, FF

8_ overview
installation
Please take note of the followings before using this product. RACK INSTALLATION
• Do not use the product outdoor.
• Do not spill water or liquid in the connection part of the product. Install the Bracket-Rack as shown in the figure, and then fasten the
• Do not impose the system to excessive shock or force. screws on both sides.
• Do not pull out the power plug forcefully. ` Fix the screws not to be loosened by vibrations. '9


• Do not disassemble the product on your own.


1(7:
25.
9,'
(25
(&2
5'(5
651

6

• Do not exceed the rated input/output range.

● INSTALLATION
REC

• Use a certified power cord only. HDD


ALA
RM
NET
WO
RK
BAC
KUP
POW
ER

• For the product with an input ground, use a grounded power plug.

CHECKING THE INSTALLATION ENVIRONMENT


<XRN-810S>
This product is a top-notch security device that is equipped Temperature One Year: 24HR X 365 DAY =8,760 HR

with a high-capacity HDD and other key circuit boards. Unit: ºC


Note that an excessive internal temperature of the product may HDD ADDITION
cause a system failure or a shortened product life (see the right
figure). Keep in mind the following instructions before installing
Make sure to unplug the power cord from the wall outlet to prevent possible electric shock, injury or product damage.
the product.
Please consult your provider for further information on HDD installation since improper installation or settings may
damage the product.
` Number of HDDs supported : XRN-410S : Max. 1
XRN-810S : Max. 2
Life (Unit: HOURS)
[Figure 1] ` Make sure to unplug the power cord from the wall outlet before proceeding with the installation.

When mounting the product on a rack, comply with the following instructions.
` Cautions for data loss (HDD care)
1. Please ensure that the rack inside is not sealed. J Please pay attention so that the data inside the HDD is not damaged.
2. Please ensure the air is circulated through the inlet/outlet as shown in the picture. Before adding a HDD, please check the compatibility with this product.
3. If you pile up the prudcts or other rack-mount devices as shown in figure 2, secure room for HDD is vulnerable to malfunction due to its sensitive nature especially against shock when operating.
ventilation or install a vent. Please ensure that the HDD is free from such shock.
We are not liable for any damage to the HDD incurred by user's carelessness or miss use.
4. For natural air convection, place the inlet at the bottom of the rack and the outlet on top.
5. It is strongly recommended that a fan motor is installed at the inlet and the outlet for air ` Cases might cause damage to HDD or recorded data
circulation. (Please fit a filter at the inlet to screen dust or foreign substances.) To minimize the risk of data loss from a damaged HDD, please backup data as often as possible.
If exposed to shock when disassembling or installing, data stored in the hard disk may be damaged.
6. Please maintain the temperature inside the rack or surrounding areas between 0°C ~ 40°C
A sudden power failure or turning off the product while in HDD operation may damage the hard disk drive.
(32°F ~ 104°F) as shown in the figure 1.
HDD or files stored inside may be damaged if the main body is moved or impacted during the HDD operation.

Rack Mount Instructions - The following or similar rack-mount instructions are included with
the installation instructions :
Cautions when installing a HDD
A) Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the
operating ambient temperature of the rack environment may be greater than room
1. Do not apply excessive force to the HDD.
ambient. Therefore, consideration should be given to installing the equipment in an
environment compatible with the maximum ambient temperature (Tma) specified by the [Figure 2] 2. Pay attention so as not to lose the disassembly screws or accessories.
manufacturer. ` If the screws or accessories are not put together correctly, the product may breakdown or not operate properly.
B) Reduced Air Flow - Installation of the equipment in a rack should be such that the amount of air flow required
for safe operation of the equipment is not compromised. 3. Please check the HDD compatibility before adding a HDD.
C) Mechanical Loading - Mounting of the equipment in the rack should be such that a hazardous condition is ` Please contact your nearest dealer to obtain the list of compatible devices.
not achieved due to uneven mechanical loading.
D) Circuit Overloading - Consideration should be given to the connection of the equipment to the supply circuit
and the effect that overloading of the circuits might have on overcurrent protection and supply wiring.
Appropriate consideration of equipment nameplate ratings should be used when addressing this concern.
E) Reliable Earthing - Reliable earthing of rack-mounted equipment should be maintained. Particular attention should
be given to supply connections other than direct connections to the branch circuit (e.g. use of power strips).

English _9
installation
Installing the HDD 4. Check for any problems in the connection terminal
and the wiring in the product, close the cover and fix
it with screws.
` If you are adding a new or previously used HDD to this product in addition to the HDD(s) originally installed, format the new
J HDD manually in the set before use.
For information on how to format an HDD, refer to "Device/Format". (page 37) ALAR
M OUT
ALAR
M 1
IN NO
2 CONNECT
1 2 3 COM ION
4 NO COM
NONO
G AUDIO
OUT
VGA
OUT
VIEWE
R

1
HDMI

USB
3
2

DC 54V

4
PoE

How to install an HDD in XRN-410S


CAME
RA

1. After unscrewing, push back and remove the cover.

5. Close the cover, and tighten a setscrew in the back.

6)%

(5
32:
/$1
5(&

6)%
USB

(5
32:
/$1
5(&

USB

2. Connect the SATA/power cables of the HDD to the


connectors on the mainboard.

How to install an HDD in XRN-810S


6)%
1. After unscrewing, push back and remove the cover.

5
:(
32
/$1
5(&

USB

3. Using the screws, fix the HDD to the bottom of the


set.

USB

5(&
/$1
32
:(
5

2. Separate them by unscrewing the fixed bracket


screw and push it towards the arrow on the board.
6)%

100
IN
AC
240~

M
ART 
AL
OU &20 G

&20 12

12
M &20 1&
AR 12
ALIN 




B
US
',2
7
$8
28

0,
+'

7
28
$
9*

5
:(
7 9,(

3
8
5

PoERA
ME
CA

4
1

10_ installation
3. After aligning and inserting one side of the HDD to
the bracket, open the other side bracket wide and
insert the HDD between them.
` Align a hole in the bracket with a screw hole in the HDD to fix
them.

● INSTALLATION
4. Push the bracket with the HDD installed and tighten
the screws to fix it.

100
IN
AC
240~

M
ART 
AL
OU &20 G

&20 12

12
M &20 1&
AR 12
ALIN 




B
US
',2
7
$8
28

0,
+'

7
28
$
9*

5
:(
7 9,(

3
8
5

PoERA
ME
CA

4
1

5. Close the cover and tighten the screws to fix it.

English _11
connecting with other device
CONNECTING TO AN EXTERNAL DEVICE CONNECTING THE ALARM INPUT/OUTPUT
` The following figures are based on Model XRN-810S. The Alarm In/Out port at the back is composed of the following.

3 3
ALARM AC 100 ALARM AC 100
240~IN 240~IN
1 7 OUT 1 7 OUT
5 ALARM    5 ALARM
$8',2 IN $8',2 IN   
9,(:(5 9*$287 287 &20 &20 &20 9,(:(5 9*$287 287 &20 &20 &20
    12 1& 12 12 G     12 1& 12 12 G
+'0,
+' USB +'0, USB

2 4 PoE 6 8 PoE
2 4 6 8
CAMERA CAMERA

$8',2
$8',2
9*$287 7
287
+'0,
+'0,
'

Sensors Alarm

• ALARM IN 1 ~ 4 : Alarm Input Port


• ALARM OUT 1 ~ 3 : Alarm Output Port
VIDEO OUT HDMI OUT AUDIO OUT
(VGA)

` Unrated or improper power source may cause damage to the system. Ensure that you use only the rated power source
J before pressing the POWER button.
1 2 3 4 G N.O C N.C N.O C N.O C G
1 2 3

CONNECTING THE USB


ALARM IN ALARM OUT
(5mA sink) (30VDC 2A,
1. On the front of the product, there is a USB port.
125VAC 0.5A MAX)
2. You can connect a USB HDD, USB memory or mouse to the USB port.
3. If a USB HDD is connected to the system, recognition and settings are available in "Menu > Device > Storage
Device". (Page 37)
4. The product supports hot plugging function that enables connecting/disconnecting USB devices while in
operating the system.

` If you use the USB device for Backup purposes, format it with FAT32 on PC if it is not formatted on the NVR.
J
` Some USB devices may fail to function properly due to compatibility issue, please check the device before using.
` Only USB storage devices that comply with the standards (having a metal cover) are guaranteed for data transfer.
` In case if the USB device’s electric contacts have been worn out, data transfer between the devices may not properly
function.

12_ connecting with other device


CONNECTING THE NETWORK Connecting to Internet through PPPoE

` For more information about network connection, refer to "Network Configuration". (Page 44)
M
3
ALARM AC 100
240~IN
1 7 OUT
5 ALARM   
$8',2 IN
9,(:(5 9*$287 287 &20 &20 &20
    12 1& 12 12 G
+'0, USB

2 4 PoE 6 8
CAMERA

Network connection via Ethernet (10/100/1000BaseT)

● CONNECTING WITH OTHER DEVICE


1
3

5
7
$8',2
ALARM 
ALARM
OUT
 
AC 100
240~IN
NETWORK
IN
9,(:(5 9*$287 287 &20 &20 &20
    12 1& 12 12 G
+'0, USB

2 4 PoE
CAMERA
6 8
PPPoE MODEM Phone(PPPoE)
Line
Switch

Windows
Network Viewer
Switch

Connecting the network camera

PnP mode
Windows ex) IP : 192.168.231.100
Network Viewer
3
ALARM AC 100
240~IN
1 7 OUT
5 ALARM   
$8',2 IN
9,(:(5 9*$287 287 &20 &20 &20
    12 1& 12 12 G
+'0, USB

2 4 PoE 6 8
CAMERA

Network connection via router

3
ALARM AC 100
240~IN
1 7 OUT
5 ALARM   
$8',2 IN
9,(:(5 9*$287 287 &20 &20 &20
    12 1& 12 12 G
+'0, USB

2 4 PoE 6 8
CAMERA

Network Camera
ex) IP : 192.168.231.10
Brodband router
Manual mode
ex) IP : 192.168.1.100
xDSL or Cable
xDSL or Cable 3
ALARM AC 100

Modem
240~IN
1 7 OUT
5 ALARM   
$8',2 IN
9,(:(5 9*$287 287 &20 &20 &20

Modem +'0, USB


    12 1& 12 12 G

2 4 PoE 6 8
CAMERA

NETWORK
Switch

Switch
Windows
DDNS Server Network Viewer Network Camera
(Data Center)

Network Camera Network Camera Network Camera Network Camera Network Camera
ex) IP : 192.168.1.20 ex) IP : 192.168.1.10

English _13
live
` If the LAN cable is not connected to the port, the setting button will not be activated for use. Check the LAN cable
GETTING STARTED M connection.

Starting the system ` The built-in DHCP Server in NVR will turn on automatically at stage 3. At this stage, using the existing DHCP server in the
same network may cause a problem, as two DHCP servers would be simultaneously operating.
1. Connect the power cable of the NVR to the wall outlet. ` For more details on network settings, refer to the user manual.
2. You will see the initialization screen.
The initialization process will last about 2 minute. 4. After setting the date/time settings in the <Date/Time>
If a new HDD is installed, the initialization process may take screen, click on the <Finish> button to launch the setting
longer. completion window.

3. The live screen appears with a beep. 5. In the setting completion window, click on the <OK> button
to finish camera setting and launch the camera registration
screen.

Install Wizard
As shown below, proceed through each step of the <Install Wizard>.
1. In the <Language> screen, select the language and press
the <Next> button. 6. If there are 8 or less cameras searched, it will be automatically registered and the camera information(fps,
days of recording) will be displayed.
2. In the <ID/PW> screen, set the password and press
<Next>. • If there are 8 or less cameras searched
• Setting Camera Password
You can change the password of the camera en bloc if the
camera password is in a factory reset state.
If the camera password is not in a factory reset state, please
enter the password of the current camera to register the
camera.
- New Password : Input a new password according to the
password setting rules.
- Confirm Password : Input the new password again. 1. The searched camera will be automatically 2. In the camera registration window, click the
registered and the initial recording value <Cancel> button to modify the recording
` A camera password registered with ONVIF and RTSP cannot be changed.
M will be displayed. settings automatically set.

• Password setting guide • If there are more than 8 cameras searched

When you click < >, a basic guide for setting a password is displayed.
After selecting a camera, press the register button.
Check the password setting rules. 0/8

Number of Searched Cameras Refresh

3. In the <Network> screen, set the network access method and the access environment. To use a simple Status
|
Model
|
IP
|
MAC
|
Network
|

intranet, click <Next>.


• DHCP server : If the DHCP server is set to enable, an IP is automatically assigned to the camera.
For more information, please refer to "DHCP Server" in the menu settings. (Page 49)
• Network 1 (Camera) : Connects to the camera and receives the video feed from the camera
Connected Authentication errors Disconnected

• Network 2 (All) : This is a port for transmitting an image to the webviewer. Register Exit

• Network 1 / Network 2 Setup


- IP Type : Choose the network connection method. Select a camera to register and click the <Register> button. Once camera registration is finished, proceed in
- IP Address, Subnet Mask, Gateway, DNS the same steps as after auto registration.

14_ live
Shutting Down the System LIVE SCREEN CONFIGURATION
1. Press the [POWER] button for your remote controller or Icons on the Live Screen
select <Shutdown> in the live screen menu.
You can check the status or operation of the NVR with the icons on the live screen.
2. The “Shutdown” confirmation pop-up window will appear.
3. Using the directional button on your remote control, select
<OK> and press the [ENTER] button or click on <OK>.

● LIVE
The system will shut down. 2016-01-01 00:00:01
FULL NO

` Only the user with the "shutdown" permission can shut down
M the system.
` For the permission management, refer to "User > Setting Permissions". (Page 28)

CAM 01
Login
To use the NVR menu, you are required to login as a user that is authorized to access the applicable menu.
1. In the live mode screen, right click the mouse button or
press the [MENU] button on your remote control. Name Description
You will see the context menu on the screen as shown.
2. Select <Login>.
 Current Date, Time Displays the current time and date.
The login dialog appears.
b Login Information When you are logged in, the "LOG ON" icon will be displayed.

` Even if you press the menu button that requires a login with the
J remote control, the login screen will appear.
It is displayed when there is ongoing backup in the live condition.

` The initial administrator ID is set to "admin" and you will need to If access to the recording canceling menu is restricted, then it is only displayed when
configure the password in the installation wizard. there is ongoing manual recording.
` Please change your password every three months to safely protect personal information and to prevent the damage of the ` Only a user with the right to cancel recording can do so.
information theft. c Screen Mode
It is displayed when the magnifying function is in operation.
Please, take note that it’s a user’s responsibility for the security and any other problems caused by mismanaging a password.

` For the restricted permission, refer to "User > Setting Permissions". (Page 28) This icon is displayed when you press the Freeze button.
M
It is displayed when all the channels are switched at the set time interval.

It is displayed when the recording data cannot be received properly due to a device
problem.

FULL Displayed if the HDD is full and the NVR has an insufficient space to record.
 System
Operation
NO Displayed if no HDD is installed or the existing HDD should be replaced.

Displayed if the HDD needs a technical examination.

English _15
live
Name Description Error Information

It is displayed when the max permitted amount of data for each channel is exceeded. • If the built-in HDD is not connected, the “NO HDD” icon ( ) will be displayed in the top left corner. In this
case, make sure you contact the service center for assistance as this may cause a failure of recording,
It is displayed when the network is overloaded. playback or backup.

 System
Operation
` It occurs when the max receiving allowance is exceeded, causing an overload to the
` If you see the NO HDD (
CPU. It will disappear if you modify the camera settings or delete a camera to reduce
the performance burden. M ), HDD FAIL ( ) icons on the screen, contact the service center for more details.

It is displayed when there is firmware to update the server.


Live Screen Menu
Displayed if no input is entered in the condition that the camera is set to <ON>.
Beside the functional buttons for your remote control, in the live screen mode, you can right click with the
Displayed when the live image with the camera turned <ON> exceeds the supported mouse button or press the [MENU] button on your remote control to launch the live screen menu from where
resolution. you can access each menu from.
The context menu differs depending on the state of Log in/out, split mode, and NVR operation status.
 Video Input
Status Displayed if no permission to live view is granted.
` Depending on the user permissions, you may have limited access to menu items of Live View, Backup, Stop Recording,
If a camera is <OFF>, or if no camera is registered, or it is in <Covert2> mode, nothing
will be displayed on the screen.
M Search, PTZ, Remote Alarm Output, and Exit.
If the camera is set to <Covert1>, the video will be displayed but the OSD menus will not
be displayed.
Single Mode Menu
 Camera Title / Channel Display the camera title and channel number.
The single mode menu is available only in Single Mode.
If the menu is displayed as <Screen Mode> in the single screen, it is displayed as a <Full Screen> in the
This icon is displayed for a channel that a PTZ-featuring camera is connected to. menu where only one channel is selected in the split screen.

Displays AUDIO ON/MUTE. Not displayed in video mode if deactivated.


Scene Mode
Layout


 Full Screen
Layout 
If the sensor is set to <ON>, the input signal will be displayed on the screen of the Keep ch. scr ratio

Keep ch. scr ratio
Status 
b
Status
connected channel. PTZ Control
c
PTZ Control
ZOOM ZOOM
Audio  Audio 
Freeze Freeze
This icon is displayed when Motion Detection is set to <ON> and a camera motion or Stop Alarm
Capture 
Stop Alarm
Capture
camera event occurs. Record
Play
Record
Play
Search Search
Backup Backup
Menu Menu
It displays the status of general/event/scheduled recording. Quick Setup
Shutdown
 Quick Setup
Shutdown

Logout


Logout
Camera Hide Launcher Hide Launcher

Operation It is displayed when it fails to decode all the frames due to limited decoding performance
and in this case only the I-Frame is decoded.
< Single Mode Menu > < One channel selection menu in the split screen >
This is displayed when a POS (text) event occurs.

RED - Displayed when there is any abnormality in the RED-SD card. Menu Description
YELLOW - Displayed when there is no storage space in the SD card.

Simple focus starts when clicking on the corresponding icon.  Full Screen
Select and click a desired channel in Split mode to switch to the full screen of the selected
channel.
When the defocus event occurs, the light blinks from the camera. When the corresponding
icon is clicked, the simple focus command is sent to the camera. b PTZ Control
Accesses the PTZ Control menu. The PTZ menu will be active on the Live screen after you
select a single channel. (Page 23)
` Only available on the camera which has defocus detection function.
c ZOOM You can enlarge the selected screen. (Page 21)

 Capture Captures the screen of the selected channel. (Page 22)

16_ live
Split Mode Menu Menu Description
In Live split mode, right-click to display this context menu as shown.
The context sensitive menu in split mode differs, depending on the login/logout status.
Menu Enter the main menu. Refer to the menu settings. (Page 26)

m Quick Setup The “Camera Register” & “Recording Setup” screen will immediately appear.

 Scene Mode 
n Shutdown The system shutdown dialog will appear.
b

Layout 

● LIVE
c Keep full scr ratio Login/Logout You can log in or out.
 Status 
 Audio Off


 Freeze
Stop Alarm Show/Hide Launcher Shows or hides the launcher. Refer to "View the Launcher Menu". (page 18)
 Record
 Play
Search

Backup
Menu
m Quick Setup 
n Shutdown
Logout
Hide Launcher

Menu Description

 Screen Mode
Select a screen mode for the Live screen.
Refer to “Live screen mode”. (Page 18)

b Layout
Set the layout of each channel.
Refer to “Layout”. (Page 21)

c Keep full scr ratio/


Keep ch. scr ratio
Channel screen ratio is changed.
Refer to "Maintain the Screen Ratio". (Page 23)
Shows the connection information of camera connected to each channel as well as live and
 Status recording status.
Refer to "Status". (Page 19)

 Audio On/Off
Turns ON/MUTE the sound of the selected channel.
Refer to “Audio ON/OFF”. (Page 22)

 Freeze Stop playing the video temporarily. Refer to “Freeze”. (Page 22)

 Stop Alarm
Stop the alarm output, deactivate the event icon and release the auto sequencing.
Refer to "Event Monitoring". (Page 22)

 Record/Stop Starts/stops the standard recording.

 Play Refer to "Search & Play > Play". (Page 54)

Search Refer to "Search & Play > Search". (Page 51)


Backup
Searches for a backup device and runs backup for each channel or schedule backup later at a
more preferable time. (Page 25)

English _17
live
View the Launcher Menu LIVE SCREEN MODE
The Launcher menu appears on the bottom of the live screen. You can play up to 8 live video channels in single, 6 type-split, or auto sequence mode.
1. Select <Show Launcher> in the context menu of the Live screen.
` When you register a camera, the Live4NVR profile is created to set H.264 800*600 30fps as default. If necessary, you can
2. Move the cursor to the bottom and click a desired item in the Launcher menu. M change it in Menu > Device > Camera > Camera Settings. If the performance is exceeded, it may play I frame only.
If you cannot create an additional profile for the camera specifications, then sometimes you cannot create Live4NVR. In this
` If no input is entered for 10 seconds, the menu will disappear.
M case, you need to modify the camera profile. Refer to "Camera Setting". (Page 34)
` The Launcher menu can be accessed only by using the mouse.
` XRN-410S only supports full screen, 2/3/4-split screen, and automatic switchover screen. Method for displaying screen mode
If you want to change the split mode, select a screen mode suggested in the launcher menu or right click with
the mouse button and select a split mode in the screen mode menu.
Press the [MODE] button on your remote controller to change it in the order suggested in the launcher menu.

 b c   
m ` XRN-410S only supports full screen, 2/3/4-split screen, and automatic switchover screen.
M
Menu Description


CH1 CH2 CH3
Layout Select the layout to be displayed on the screen. CH1 CH2

b
CH4 CH5 CH6

Layout Setup You can set, change or delete the new layout of each channel.
CH7 CH8 CH9 CH3 CH4 CH1 CH2 CH3 CH1 CH2

c Screen Mode
Displays a list of split modes available in a bar type.
The current screen mode will be displayed grey.
9-split mode 4-split mode 3-split mode 2-split mode

 Menu Expansion CH2


Click to display the hidden menu to the right. CH2
Button CH3

CH1 CH3

 Backup
Searches for a backup device and runs backup of each channel or schedule it for later at a more
desirable time.
CH1 CH4

CH4 CH5 CH6 CH5 CH6 CH7 CH8 CH1 CH1

 Zoom Enlarges the selected area. This is available only in Single Live mode. 6-split mode 8-split mode Auto Sequence Single mode

 PTZ
If the network camera connected to the selected channel supports the PTZ operations, this will run
the PTZ control launcher. This is active only in Live single mode.

 Alarm Stops the alarm if it's activated.

 Freeze Freezes the Live screen temporarily.

Capture Captures the screen of the selected channel.


Text Text output is ON or OFF.

Play Enters Play mode if a file to play exist, and if not, enters Search mode.

m Record Start/End recording the Live screen.

18_ live
Switching the split mode Manual Switching
You can also play 8 Live channels in the sequence of: Single, 4-split mode. Press the left/right button on the front panel or the remote control, or click the arrow <◄/►> key to move to
the next split mode.
Press the button in the launcher or use the right menu to Scene Mode  9-split
automatically switch the screen. Layout 
Keep full scr ratio
4-split • If pressing the right [►] button in 4-split mode :
3-split

Mouse right button menu  Screen mode  Auto switching


Status
Audio Off

2-split 4-split (CH 1~4) mode  4-split (CH 5~8) mode  Auto Sequence
6-split
Freeze
mode Stop Alarm 8-split
Auto Sequence

● LIVE
Record
Play
If you reach the end of the steps as outlined in the previous Search
Backup
page, you will be moved to the first page and no automatic Menu
Quick Setup 
CH1 CH2
switching will be performed. Shutdown

 
Logout
Hide Launcher CH1 CH2 CH5 CH6 CH1 CH2

CH3 CH4 5-8


CH3 CH4 CH7 CH8 CH3 CH4 1-4

Status
Auto Sequence
You can check the connection information of the camera to be connected to each channel on the live screen.

Channel information
Select the <CH info> in the live screen menu to check
CH1
the status of camera connection to each channel.
CH1 8
CH1
CH1 CH1 CH2
CH1 CH1 CH2
CH1 5-8
CH1
CH1 CH3 CH4
CH3 CH4

1 1-4
Single mode
4-split mode

` In a split mode, If you have set <Sequence switching time> in "Setting the Device > Monitor", Auto Sequence will be
M conducted at the set interval. (Page 39)
` When you switch the channel, the video may be delayed depending on the network condition.

Live Status
If you select <Live> in the <Status> menu on the live screen, you can check the transmisson information and
state of the camera connected to each channel.
• Model : Displays the camera model name connected to each
channel.
• Status : Displays the status of camera connection set to each
channel.
• IP Address : Displays the IP address of a camera set to each
channel.
• Codec : Displays the live profile codec information for a
camera set to each channel.
• Resolution : Displays the live profile resolution of a camera set
to each channel.
• Frame Rate : Displays the live profile transmission rate for a camera set to each channel.

English _19
live
Record Status • PoE : Turns on/off the power supply to the camera.
If checked, it means the power supply is On; if not checked, it means it is Off.
If you select <Record> under the <Status> menu on the live screen, you can check a channel's video type,
• Additional information : If there is a problem in the power supply, it is explained here.
recording type, number of input/recording frames, allowed/input/recording data volume.
Power supply problems include excessive power (class 1 to 4) and voltage errors.
• Total Bitrate (Record/Max) : Record bitrate shows the amount
• Total PoE power consumption : Display the sum of power consumption for all the ports.
of actual data recording while Total bitrate shows the
maximum data transfer allowed by the NVR. 2. Press <Return> to move to the previous screen.
• Profile : Shows the video profile configured to each channel.
• Frame (fps) : Show the input/record frames per second for Channel Setting
each channel.
• Bitrate (bps) You can display the channel in a desired area of a split screen.
- Limit / Input / Record : Shows the amount of limit/input/ 1. Place the cursor over the camera name of each channel to display the <▼> key to the right on the screen.
recording data for each channel. 2. Click a camera name to display a channel list where you can select a different channel.
- Input / Limit : Shows the data ratio of actual data transferred from the camera and allowed maximum
3. Select a desired channel and click it.
defined by user.
The current channel will be switched to the selected one.
• Current : Shows the recording status information of currently transferred data. Use the cursor to select a channel to move, and drag and drop it to a desired channel; this can also change
• MAX : Shows recording information of the most biggest recording data out of configured standard and event the channel position.
recordings. ` Ex : if switching CH 1 to CH 7
• : Reloads the recording information.
CH1 CH2 CH3 CH7 CH2 CH3
• Record Setup : The menu screen will switch to the record setting screen.

` The warning message on the list's bottom means the NVR replaced the selected recording profile with other available profile,
CH4 CH5 CH6  CH4 CH5 CH6

M since the selected one does not produce video data which prohibits screen saving. If the screen displays video, it CH7 CH8 CH1 CH8

automatically resets to the selected profile and its name turns to yellow in the list.
Switching to Single Mode
` If Key Frame recording exceeds the allowed data amount specified by limit bitrate, a popup alert and icon appear on the
screen. When in split mode, select and double-click a desired channel to switch to its Single mode.
The limited recording alert popup does not repeat after displaying once unless camera or recording settings are changed; it Press the channel number button on the remote control to switch to single screen.
may appear again if settings were changed to notify such status. Refer to "Remote Controller > Using the Number Button". (Page 8)
If you want to set the alert popup not to appear, change your setting of <Setup Warnings> not to display a message popup.
For further information on bitrate limit of recording data, refer to “Record Setting”. (Page 41)
 Ex : With your mouse, double click on channel 3 or press the number 3 on the remote control.

PoE Status CH1 CH2 CH3

When <PoE> is selected in the <Status> menu of the live screen, the PoE status in each port can be CH4 CH5 CH6 
determined.
CH7 CH8 CH3

1. Select the <PoE Status>.


PoE status view window is displayed.
• Consumption(W) : Displays the power consumption in PoE.
- 0 : No device is connected to the port or a device is using
its own power supply.
- – : Trouble in the port (More detailed trouble information can
be displayed in additional information.)

` Overall PoE power specifications are as follows: XRN-810S(8 ports)


M is 100W, and XRN-410S(4 ports) is 50W. If a single port exceeds
36W, or the power to all ports exceeds the overall PoE power specifications, the power to ports will be shut off sequentially.

20_ live
ZOOM LAYOUT
This is activated only in Live Single mode. In the live screen, you can set the layout for each channel.
After selecting a single screen, if you use the Magnify function, the selected area will be magnified by 3.
Setting Up the Live Layout
1. In the live screen menu, select <ZOOM>.
Press the [ZOOM] button on your remote control or click < > on the launcher menu.
This section outlines how to select a series of channels based on their purpose/accessibility and monitor them
The Magnify icon in the middle of the screen will be displayed.
in a single layout.

● LIVE
2. You can use the remote control's directional key(▲▼◄►) or drag with the mouse to set the area of Example) Layout "Lobby" - Lobby camera 1, Lobby camera 2, Front entrance camera 2
magnification. Layout "VIP" - Directors' meeting room 1, Directors' meeting room 2, Directors' lounge 1, Corridor camera on
3. Press the [ENTER] button or double click with the mouse to magnify the selected area by 3 times. the 7th floor
` In the magnified screen, you can drag with the mouse or use the remote control's navigational key (▲▼◄►) to move the
magnified area.
c

4. In the live screen menu, select <Zoom Out>. b


Press the [ZOOM] button on your remote control or click < > on the launcher menu to cancel the
magnification function.




   

To create a new layout, follow these steps:


 Open the channel layout setup menu.
b Click <New>.
<Normal> <Enlarged 3x> c Enter a name for the selected channels (e.g., PARKING).
 Select the channels that you want to add to the layout (e.g., 1, 2, 3, 4).
 Choose a split mode to apply (e.g., 4-way split).
 Click <OK>.
 Choose a layout to view it on the screen (e.g., change to PARKING).
1. Select the < >.
The layout setting screen will appear.
• New : You can set the new layout.
• Rename : You can make changes to the selected layout.
When the layout is changed, the channel order is initialized.
• Delete : You can delete the selected layout.
• Channel Table : You can select channels in the table to be registered in, or removed from the layout.
• Channel List : You can select channels in the list to be registered in, or removed from the layout.
2. Press the <New> button and enter the name of layout to add.
3. In the <Ch. Table> or <Channel List>, click and select the channel to be displayed on the layout screen.
4. Click on <OK> to save the selected layout.

` The layout for each user is saved separately.


M

English _21
live
AUDIO ON/OFF ` Ex : If you set <Event Display> to 5 seconds, and the second event occurs in CH 2 within the set time after the first event
occurred in CH 1.
You can turn the sound on/off corresponding to the channel in Live mode.
Event occurrence 4 seconds 9 seconds

AUDIO ON/OFF in Single mode


In the screen, click on the audio icon ( ) or in the remote control, press the [AUDIO] button to turn it on/off.

` If you have configured the audio output settings properly but the audio or voice is not output, check if the connected network Stop alarm
M camera supports the sound signal and if you have configured the sound settings as appropriate.
The sound icon can be displayed if the sound signal fails to output from noise. CH1 CH2

` Only the channel where <AUDIO> is set to <ON> in "Setting the Device > Camera" displays the audio icon ( ) in Live CH1
mode that you can use to turn the sound on/off.

` Press the [ALARM] button or select <Stop Alarm> to initialize the alarm output status and cancel the event function.
FREEZE M
` If an alarm is output with the pre-event and post-event times specified together with the event recording settings, the event
This is available only in Live mode, this pauses playing the Live image temporarily. recording will perform according to the specified recording type (pre event or post event).
1. Press the [FREEZE] button on your remote control or click < > in launcher mode.
` In case of continuous events such as motion detection, switching to another split mode display may not immediate if
Video playing is paused.
J concatenating events follow, even when you stopped alarm of the event.
2. Press the [FREEZE] button on your remote control or click < > in launcher mode.
Pause is canceled. Playing is resumed. ` The video may be delayed depending on the network condition.
` The event output can be delayed as the transfer of the alarm event from the network camera takes time.

EVENT MONITORING
CAPTURE
This will display the channel in sync with a specific event (Sensor/Motion/Video Loss) if it occurs.
In "Monitor > Event Display", set the event monitoring to ON/OFF and specify the event display time. (Page 39) You can capture a screen selected on the live screen.
Function to perform in single channel mode on the live screen or when selecting a channel.
• If multiple events occur simultaneously, the screen will switch to a split mode.
- 2~4 events : 4-split mode
- 5~9 events : 9-split mode
• If the second event occurs within the set time of <Event Display>, the first event will last until the second one
is terminated.
` Ex : If you set <Event Display> to 5 seconds, and only one event occurs in CH 1.
Event occurrence 5 seconds

1. Select <Capture> from the live screen menu.


You can click on < > in the launcher menu.
Stop alarm
2. Select the output information to be displayed on the captured screen.
` When you select the <Description> check box, a window to enter a description is opened and you can enter up to 50 Korean
letters.

3. Select a device to save a captured file, file path and file name.
CH1
4. Complete the settings and click <OK>, then the image captured from the screen is saved to the selected
device.

22_ live
MAINTAIN THE SCREEN RATIO DISPLAY TEXT
The screen ratio for a live video can be changed.
Change text output
Maintain a screen ratio for all channels
The NVR can display text on a live screen when a text device is set.
Video screen ratio for all channels can be changed in live split screen mode.

● LIVE
1. Select <Keep full scr ratio> from the live screen menu. Select text output
The screen ratio for all channels will be changed.
This is executable when a text device is connected.
2. If you want to go back to the previous screen ratio, check the menu option for <Keep full scr ratio>.
• How to turn the text output off : Select "OFF" from the text list.
• How to display on other devices differently from the preset device : Select a device to display from the text list.
Scene Mode ►
Layout ►
Cheese 0.69
Keep full scr ratio Onions 1.58
Peppers red, loose 0.59
Status ► 2 x 0.79 1.18

Audio Off
Onions 3.59
Freeze


Stop Alarm CHIP 2.37
Record
OFF OFF TEXT 01 Apple 2.69 TEXT 01
Play
Cheese 0.69 Cheese 0.69 Cheese 0.69
Goat 0.79Onions 3.59
Search Onions 1.58 Onions 1.58 Onions 1.58 CHIP 2.37
Peppers red, loose 0.59 Peppers red, loose 0.59 Peppers red, loose 0.59 Cheese 0.69
Backup 2 x 0.79 1.18 2 x 0.79 1.18 2 x 0.79 1.18 Apple 2.69
Menu Onions 1.58Goat 0.79
Quick Setup ► Peppers red, loose 0.59 Cheese 0.69

Shutdown Onions 1.58


2 x 0.79 1.18 Peppers red, loose 0.59
Logout
TEXT 01 TEXT 01 TEXT 01 Pasta 0.59 2 x 0.79 1.18
Hide Launcher
Cheese 0.69 2 x 0.59 1.18
Onions 1.58
Peppers red, loose 0.59
2 x 0.79 1.18 ======================== OK

TOTAL 3.63

OFF TEXT 01
TEXT 01

Maintain a channel screen ratio


PTZ CONTROL
If you select a channel from a live single screen or split screen, you can change its video screen ratio.
1. Select <Keep ch. scr ratio> from the live screen menu. With this NVR, you can configure the settings of a PTZ camera as well as commercial cameras in the market to your
The screen ratio of a specified channel will be changed. preference.
2. If you want to go back to a previous screen ratio, select <Keep ch. scr ratio> again. PTZ device
Scene Mode
Layout


This is active only if a channel that a PTZ camera is connected to is selected.
Keep ch. scr ratio

Getting started with PTZ operations


Status ►
PTZ Control
ZOOM
Audio ►
Freeze
The PTZ camera will be activated only if the channel of the PTZ camera is selected, which can be performed in

Stop Alarm
Capture
Record
the following way:
Play
Search
Backup • Using the launcher menu : Click < > from the launcher menu of the Live screen.
Menu
Quick Setup
Shutdown

• Using the Live screen menu : Select <PTZ Control> in the context menu of the Live screen.
Logout
Hide Launcher
• Using the icons on the Live screen : Simply click the < > icon on the Live screen.

` This is available only if a PTZ camera is connected and the <


M > icon is displayed on the screen.
` Even if the connected network camera does not support the PTZ operations, you can configure the PTZ control settings
(if possible) by installing the PTZ driver (physical device).
` It only supports a network camera with Hanwha Techwin's PTZ function and a camera registered in the ONVIF.

English _23
live
Using the PTZ camera Preset
You can use a single PTZ camera to perform the Pan, Tilt and Zoom operations to monitor multiple places, and Preset is a specific position remembered by the PTZ camera. You can use the Preset function to define up to
configure the custom settings of the presets in a desired mode. 255 presets for a single PTZ camera.

1. Open the <PTZ Control> menu. To add a preset


The < > icon in the left bottom of the screen will turn yellow, indicating that the system accesses "PTZ
1. Check the preset checkbox.
Control" mode. You will see the "PTZ Control" launcher menu.
2. Select < >.
` The PTZ working (active) mark can be active even if the PTZ operation is not available in normal mode. So ensure that you
M have completed the PTZ settings before proceeding.
The virtual keyboard will appear on the screen. Use it to provide the preset name.
` Refer to "Using Virtual Keyboard". (Page 27)
2. Adjust the camera recording location by using the PTZ ball in the launcher menu or press the left/right • : You can change the preset settings to your preference.
(▲▼◄►) button on your remote control to move the camera recording location.
• : Delete a selected preset.
• Sensitivity : Adjust sensitivity for Pan, Tilt controls.
• : Delete all the existing preset settings.
• PTZ Wheel : Click a near area from the center to move the camera lens slowly; clicking a far area will move it
` You can add up to 255 presets, which is the max count supported by the NVR.
fast.
M
` If clicking and holding the mouse in the left will turn the camera counterclockwise; if clicking and holding the mouse in the right ` If you replace a camera that saves your preset settings with a different one, you must configure the preset settings again.
will move the camera lens clockwise.
3. Select <OK>.
• Zoom : Activate the Zoom operation of the PTZ camera.
The preset setting will be saved in the provided name.
• Iris : Adjust the amount of light incoming to the camera.
• Focus : You can adjust the focus manually. To change or delete a registered preset
• Swing : Swing is a monitoring function that moves between two preset points and enables you to trace the
motion.
• Group : The group function enables you to group various presets before calling them in sequence.
• Trace : Tracking remembers the trace of movements that you instructed and reproduces it for your reference.
• Tour : Monitor all the groups created by a user in turn.
` Some cameras may differ in the menu title and operation with regard to Swing, Group, Tour and Trace.

` Even if the network camera supports the PTZ operations by default, the PTZ control can be enabled only if the applicable
J menu is active in the launcher menu.
1. Check the preset checkbox and select a preset to change or delete.
Using Digital PTZ (D-PTZ) function 2. Press < > or < > as needed.

1. Register a camera that supports the D-PTZ profile. • : Delete all the existing preset settings.

- In cameras that support the D-PTZ profile, you can use the D-PTZ function. ` If you delete the entire presets, the default presets specified in the network camera can be deleted accordingly.
2. Both cameras that support general PTZ and cameras that support D-PTZ can control the live image using
J
some of the <PTZ control> function menus. 3. Provide a new name and press <OK>.
` For more information about the supported functions, please refer to the camera manual.

24_ live
BACKUP
You can check the backup device and set the backup schedule by channel or by time.

● LIVE
1. Press the [BACKUP] button on the remote control, or select <Backup> from the live screen menu.
You can click on < > in the launcher menu.
2. The backup settings screen will be opened.
• Channel : Sets the channel to backup.
` You can select multiple channels.
If you select <All CHs>, all channels will be selected.
• Backup Range : Sets the <Start> and <End> time for the backup.
• Overlapped Data : Shows a list of overlapping data on a same time according to the number of data.
It appears when one channel has multiple data on a certain time point due to changing of time or time zone
settings, etc.
` Refer to time and time zone of “Setting the Date/Time/Language”. (Page 26)
• Device : Select a backup device from the recognized devices.
• Type : Sets the backup data format.
- NVR : Saved data can be played back only by the NVR.
- SEC : Saves data in the proprietary format with built-in viewer, which supports immediate playback on a
PC.
` When you select the SEC format, you can select or deselect "Password" and "Text data included".
• Path : displays the location of the folder in which the backup file is to be saved.
• Check capacity : Shows the size of the selected backup data, used and available capacity of the selected
backup device.
3. When the backup setup is done, press <OK>.
` If no available device is recognized for backup, <OK> button is not activated.

` The application may slow down during the backup.


J
` You can switch to the menu screen during the backup in operation, but playback of data is not available.
` The data can be played back on a Webviewer while the backup is in progress but audio does not function.
` If backup has failed, select “Device > Storage Device” and check the free space of the HDD and check also if the HDD is
properly connected.

` Pressing the <Exit> during the backup will return to the previous menu, while the backup progresses.
M

English _25
menu setup
You can setup the system, devices, and options for recording, event and network. • Holiday : A user can select specific dates as holidays according to their own preferences.
Holidays are applied in the <Recording Schedule> or <Alarm Schedule> setting too.
SYSTEM SETUP
You can setup Date/Time/Language, User, System Properties and Log.

Date/Time/Language

Setting the Date/Time/Language


You can check and setup the current Date/Time and time related properties, as well as the language used for
the interface on the screen.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö <System> Ö ► Ö <Date/Time/Language> Ö ` e.g. every first day of a year is set to be a holiday if you select January 1 and check <1/1>, and every first day of a year and every
[ENTER] Ö ▲▼◄► Ö [ENTER] first Wednesday of January are set to be holidays if you check <1/1> and <Jan First Wed>.

To use the calendar

1. Select year and month.


Select the < > key on both ends of year and month to move back/forward to the previous/next year
• Date : Sets the date and its format that will appear on the screen. or previous/next three month.

• Time : Sets the time and its format that will appear on the screen. 2. Select a date and click on the <OK> button.

• Time Zone : Sets the time zone of your area based on the Greenwich Mean Time (GMT).
` A date is marked in gray if there exist data for search for system log, event log, time search and event search.
` GMT (Greenwich Mean Time) is standard World Time and the basis of world time zone.
• Time Sync. : Specify the use of synchronization with the time server.
Click the <Setup> button to display time synchronization setup screen.
If you select to use the <Time Server>, the current time will be synchronized on a regular basis by the server
defined as <Time Server>.
If this is the case, you cannot change the time setting manually.
- Synchronization : Specify the use of synchronization with the time server.
- Time Server : Enter an IP or URL address of the time server.
- Last Sync Time : Displays the most recent synchronization time from the selected time server.
- Activate as Server : Set to <Use> to allow the NVR to act as a Time Server for other NVRs.
• DST : Set up Daylight Saving Time with its period to make the time earlier than the GMT of its time zone by 1
hour during the set period.
• Language : Select your language. Sets the language for the interface.
English, French, German, Spanish, Italian, Chinese, Russian, Korean, Polish, Japanese, Dutch, Portuguese,
Turkish, Czech, Danish, Swedish, Thai, Romanian, Serbian, Croatian, Hungarian, Greek, Finnish, and
Norwegian are supported.

26_ menu setup


User User setting
You can set permissions of each user over the NVR's specific function and settings. You can create a group or set permissions for each group.
You can add a user and edit the registered user information.

Setting the Administrator [MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ►▼ Ö <System> Ö <User> Ö [ENTER] Ö ▼► Ö
<User> Ö ▲▼◄► Ö [ENTER]
You can set and change Administrator's ID and password.
The administrator can use and set all menu items and functions.

● MENU SETUP
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö <System> Ö ►▼ Ö <User> Ö [ENTER] Ö ▼ Ö
<Administrator> Ö ▲▼◄► Ö [ENTER]

If you want to add a group


1. Click on the [ ] button to launch the Group Addition popup window.
If you want to add a group, click on <OK>.
• ID : Change the admin ID. 2. Press the group name item to launch the virtual keyboard used to enter group names.
Enter the group name to register.
• Password : Checks the current password.
` You can add a maximum of 10 groups.
• New P/W : Enter new password.
• Confirm P/W : Confirms the new password. If you want to set group permission
` If <View password> is selected, the password will no longer be hidden on the screen when you type it. Set permission to access each group.
Each group's users can only access items with a check mark beside them.
` The initial administrator ID is set to "admin" and you will need to configure the password in the installation wizard.
M 1. Select the menu to set group permissions.
` Please change your password every three months to safely protect personal information and to prevent the damage of the The menu with access permissions will appear when a user of the group logs in.
information theft.
Please, take note that it's a user's responsibility for the security and any other problems caused by mismanaging a password. • Live View : You can set permissions to access the live screen for each channel.
• Search : You can set permissions to access the search menu for each channel.
` If you click < >, a basic guide for password setup is displayed.
• Backup : You can set permissions to access the backup menu for each channel.
Using Virtual Keyboard • Menu : You can select and set the setting menu that can be accessed. A group user can only access the
menu selected. If you select the menu, the menu permission setting screen will be displayed.
1. For alphanumeric inputs, the virtual keyboard window appears.
• Record Stop, PTZ, Remote Alarm Out, Shutdown : You can select these functions to add to a group's
2. Using the directional key(▲▼◄►), move to the desired text tab and press the
permissions.
[ENTER] button.
3. In the upper text input box of the virtual keyboard, there displays a list of 2. Click <OK>.
candidate words containing the selected character. Check a group user to give them the permission to access the selected item.
4. Select a word from the list, or use the keyboard to enter the whole word.
` If there are many of candidate words, use < > buttons to move between them forward
and backward.
5. Select <OK>.
Entered word is applied.
` For upper case letters, use <Caps Lock> button.
` For special characters, use <Shift> button.
` Using the virtual keyboard is the same to a normal keyboard use in your region.
` ID allows alphanumeric characters only.
` The password should at a minimum be an 8-digit combination of alphabetical letters and numbers.

English _27
menu setup
If you want to register a user Setting Permissions
You can set restricted access for all general users.
Items with restrictions will require logging in for use.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö <System> Ö ►▼ Ö <User> Ö [ENTER] Ö ▼► Ö


<Permission Setup> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]

1. Click on the [ ] button to launch the user addition popup window.


To add a user, click on <OK>.
2. Select a group.
When registering a user, the selected group will be automatically registered.
` A group can be changed after inputting all required information.
• Restricted Access : All menu items allowed for a user can be set with restricted access.
3. Enter name, ID, password and select whether to use the viewer.
- Checked ( ) : Restricted
If you activate use of <Viewer>, you will have the right to use the web viewer and the network viewer.
- Not checked ( ) : Accessible
4. Click <OK>.
` If it is not checked ( ) in <Restricted Access>, any user can access the item no matter what the <Permission> setting.
Registered user information will be saved.
` If it is checked ( ) in <Restricted Access>, a user can access the item only if the user has permission in <Permission>
When you want to delete the group and user information setting.
1. To delete, click on the [ ] button. • Restriction on Network Access : Restricts remote access from a <Restricted Access> network.
2. The deletion confirmation window will appear and you can select an item to delete and click on <Delete>. - All Network : Restricts all access instances via Network Viewer and Web Viewer.
- Web Viewer : Restricts access via the Web Viewer.
• Auto Log out : A user will be automatically logged out if there is no operation on NVR for over set period of
time.
• Manual Input of ID : In the login window, select whether to enter ID.

28_ menu setup


If the user has restricted access System Management
If a new group is restricted to access the entire menus, the users belonging to the group can access only the You can check the system version, update to a newer version, as well as data backup and initialization.
basic menus and can change only their respective password.
If all permissions are restricted, you will see only some menu items accessible in the Live screen menu. Checking the System Information
You can check the current software version and MAC address before proceeding with the upgrade.

● MENU SETUP
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö <System> Ö ►▼ Ö <System Management> Ö
[ENTER] Ö ▼ Ö <System Information> Ö ▲▼◄► Ö [ENTER]

To change the user password


If you log in with the user account of a group with restricted access, you just can change your own password.

• System Information : Shows the current system's information.


The values can not be changed by a user.
• S/W Upgrade : Updates the NVR's software up to date.
- Press the < > button to search for and display the equipment to upgrade.
• Device Name : Displayed if the network viewer is connected to NVR.

To upgrade the current software version

1. Provide the login information.


2. Select <User Menu>.
The Permission Management screen appears.
3. Select <User>.
The Password dialog shall appear.
4. Provide a new password.
5. Select <OK>.
The old password will be changed to a new one. 1. Connect a device storing the software to be updated.
` It may take about 10 seconds to recognize the device.
` Upgradeable devices include USB memory, and network device.
` To update the network, the current NVR should have been connected to the network.
Upgrade via the proxy server may not be enabled due to the restricted access.

2. Select <System Management> from <System> window.


3. Select <System Information>.

English _29
menu setup
4. When the recognized device appears, select <Upgrade>. • Load Factory Default : Restore the factory default settings of NVR.
` If you connect a device in the upgrade menu window, you can press the < > button to search for available software. Uncheck the checkbox of an item(s) that you want to reset. Then, only the other items than the selected one
will return to the factory default.
` If there is an upgrade image on the network, the popup window will appear. If <Initialization> is selected, a confirmation dialog for "Load Factory Default" prompts. Press <OK> to
` The <Upgrade> button will be activated only if the current <Software Version> of the <System Information> is same to or initialize the system to the factory default.
older than that of <S/W Upgrade>. ` After changing the mode, reboot to initialize. (PnP mode <-> Manual Setup Mode)
5. Press <OK> in the "S/W Upgrade" window. • Power off : If the power is off, the first alarm is generated. After checking the checkbox, if the <Apply> button
` While updating, it shows the progress. is pressed, all event alarms that are set to the first alarm output are released, and then the first alarm cannot
be selected by other alarm output.
6. When the updating is done, it automatically restarts. ` If that function is set, the first alarm-out checkbox and all alarms in the alarm setup screen are deactivated, to Off.
Do not turn the power off until it finishes restarting.
` If you want to initialize the <Authority Setting>, you need to reset the password.
M ` If "Upgrade Failed" appears, retry from the step 4. M In case you reboot, reset it the Installation Wizard and if not, use the guide screen to reset it.
When you experience continued failure, consult the service center for assistance.

Log Information
Settings
You can browse logs on the system and events.
You can copy and import the NVR settings by using a storage media.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö <System> Ö ►▼ Ö <System Management> Ö Checking the system log
[ENTER] Ö ▼► Ö <Settings> Ö [ENTER] Ö ▲▼◄► Ö [ENTER] System Log shows log and timestamp on every system start up, system shutdown, and changes on system
settings.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö <System> Ö ►▼ Ö <Log Information> Ö [ENTER]


Ö ▼ Ö <System Log> Ö ▲▼◄► Ö [ENTER]

• Storage Device : Shows the connected storage device.


- Press the < > button to view the list of storage devices.
• Export : Exports NVR settings to the connected storage device.
• Import : Imports NVR settings from the storage device and applies to the NVR. • Search Day : Click the Calendar icon to display the calendar window, or use the direction buttons to specify
- Uncheck the checkbox of an item(s) that you want to import. the search period of the system log.
Only the other items than the selected one will be applied to the NVR. ` For using the calendar, refer to "To use the calendar". (Page 26)
- You cannot retrieve the configuration file from another mode. In other words, in PnP mode, you cannot
retrieve the manual setting information. In manual setting mode, you cannot retrieve the PnP setting • Search : Specify the date and press this button to display the search result in the log list.
information. • Type : When there are too many logs, you can display logs of the desired format by selecting the type.
` <Export> and <Import> settings should be used in the same software version. • Export : Save all the logged information recorded in the NVR into the storage media.

30_ menu setup


Checking the event log SETTING THE DEVICE
You can search recorded events including alarms, camera events and video loss.
You can configure settings related to camera, storage media, monitor and text.
It also shows the log and its timestamp.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö <System> Ö ►▼ Ö <Log Information> Ö [ENTER] Camera


Ö ▼► Ö <Event Log> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]
To register a camera

● MENU SETUP
You can register a network camera for each channel and make connection between.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ► Ö <Camera> Ö [ENTER] Ö ▼


Ö <Cam Registration> Ö ▲▼◄► Ö [ENTER]

• Search Day : Click the Calendar icon to display the calendar window, or use the direction buttons to specify
the search period of the system log.
` For using the calendar, refer to "To use the calendar". (Page 26)
• Search : Specify the date and press this button to display the search result in the log list.
• Type : When there are too many logs, you can display logs of the desired format by selecting the type.
• Preview : View the video of the channel as a current image.
• Export : Save all the logged information recorded in the NVR into the storage media.
` Camera searched with ONVIF does not provide previews.

Checking the backup log • Protocol : Show the protocol information of a registered network camera.
• Model : Show the camera model name.
You can find out who backed up and the details (backup time, channel, device to use, file format, etc.).
• IP Address : Display the IP address of a network camera.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö <System> Ö ►▼ Ö <Log Information> Ö [ENTER] • Connection : Display the connection status.
Ö ▼► Ö <Backup Log> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]
• Data Rate : Displays the total amount of data received by the channel.
• PoE Status : Displays connected PoE status information.
• ONVIF Setup : You can additionally set up ONVIF protocol camera.
• Error code guides : You can check the details of generated error codes.

` If the NVR has been initialized, it may not connect to cameras. Configure the network settings first and add cameras.
M For more information on network settings, refer to "Network Configuration". (Page 44)

• Search Day : Click the Calendar icon to display the calendar window, or use the direction buttons to specify
the search period of the system log.
` For using the calendar, refer to "To use the calendar". (Page 26)
• Search : Specify the date and press this button to display the search result in the log list.

English _31
menu setup
If you want to register a camera in PnP mode 5. Click on the <ID/PW> button to enter the selected network camera's <ID> and <Password>.
6. Press the <Connection Test> button to make a connection to a camera.
7. Press <Register> to register the selected camera.

To manually search for and register a network camera

` When you connect a camera in PnP mode, the initial ID, password and DHCP mode should be set in advance.
J
` Samsung cameras are registered for Samsung protocols and other cameras are registered by using the Onvif protocol.
` In PnP mode, you cannot connect a device that runs the DHCP server in PoE port or camera setting port. (Ex: hub) 1. In the <Cam Registration> menu, click on the <Manual> button.
2. The manual search window will appear.
To auto-search for and register a network camera
3. Select a channel and protocol used to connect to a camera.
The input items may differ depending on the selected protocol.
• SAMSUNG : Comply with the internal network protocols adopted by Hanwha Techwin.
• ONVIF : Means the camera supports ONVIF protocols. When connecting a camera that its name cannot be
found from the list, select <ONVIF>.

` Time difference between the ONVIF camera and NVR exceeds more than 2 minutes, the camera cannot be connected. In this
M case, synchronize the ONVIF camera's time to the NVR or set times of both camera and NVR to a same NTP server (if in the
same time zone), or make the NVR an NTP server.

1. In the <Cam Registration> field, click on the <Auto> button. • RTSP : Comply with RFC 2326, one of "Real Time Streaming Protocol (RTSP)" for real-time streaming.
2. Search for a network camera connected. 4. If you select the <SAMSUNG> protocol, check options as necessary.
` An already registered camera will be marked in blue in the list. • Model : Select a camera model.
` If you search for the camera again or if the IP is an old IP that was not assigned by the DHCP server (such as -192.168.1.100), - Samsung Network Camera/Encoder : Means the camera/encoder supports Hanwha Techwin's SUNAPI,
then press the < > button to check if a new IP has been assigned. If the IP is still the same, then select Assign IP to assign SVNP protocol. When connecting a camera that does not appear in the camera list, select Samsung
the IP manually. Netowrk Camera/Encoder.
` However, you must select the correct model name of the camera, if it's in the list. Some of obsolete camera models may not be
3. Select a camera from the camera list to see a preview of its current video feed. supported.
` Camera searched with ONVIF does not provide previews.
` The below models are discontinued. If you register them with ONVIF, some camera functions will be restricted or cause errors.
4. Check the checkbox next to a network camera that you want to connect to. It is recommended you register the Samsung protocol.
` You can select all of the network cameras in the list and provide <ID> and <Password> all at once. - SNB-2000, SNB-3000, SNC-B2315, SNC-B2331, SNC-B2335, SNC-B5368, SNC-B5395, SNC-B5399, SNC-570,
SNC-1300, SND-460V, SND-560, SND-3080, SND-3080C, SND-3080CF, SND-3080F, SND-3081, SNP-3301, SNP-3301H,
` Click a header at the top of the list to sort the list according to that header. SNP-3350, SNP-3370, SNP-3370TH, SNP-3750, SNV-3080, SNP-3430

` Registering camera with user account other than admin may restrict camera function.
J
` When you change the camera ID/password in the camera web viewer, if the camera is already registered in NVR, you also
have to change the camera ID/passowrd information registered in NVR.

32_ menu setup


• Address type : Select an address type of the camera. • Authentication has failed : This message appears if the ID or password provided for registering the camera
` Address type can be different dependingon connected product model. is incorrect.
• Connection has failed due to excessive concurrent users. : This message appears if the concurrent user
- Static(IPv4)/Static(IPv6) : Used to provide the IP address of the camera manually. count exceeds the upper limit.
- Wisenet DDNS : This is available only if the camera is registered with the Wisenet DDNS(ddns.
• Connection has failed due to incorrect HTTP port information. : This message appears if the HTTP port
hanwhasecurity.com) server. Provide the registered domain for DDNS ID. number of the camera is invalid.
` Ex) http://ddns.hanwha-security.com/snb5000  provide “snb5000” for Wisenet DDNS • Connection has failed. Unknown connection status. : This message appears if the camera has failed to

● MENU SETUP
- URL : Used for URL address input. be connected due to a unknown error.
• User Model Modification : When registering a new camera, it is named according to the device's default if
` Refer to the user manual of the connected camera and check the DDNS specification that is supported by the camera. user set the model to <Samsung Network Camera/Encoder>. In case if automatic registration fails, user
M can change the model name of camera to be registered.
• IP Address : Provide the IP address of the camera.
To edit camera profile
• Device Port : Provide the device port of the camera.
When a camera is added for the first time, it is added as the default profile of H.264, H.265 and MJPEG in
• HTTP Port : Provide the HTTP port of the camera.
order temporarily.
• ID : Provide the ID of the camera that you want to register. To change its profile, refer to "Setting the network camera's recording profile" (Page 41) or "Live Setting"
• Password : Enter the password of the camera to be registered. (Page 36).

5. Select <ONVIF> or <RTSP> for the protocol and enter your input for each field appears. ` In case of NVR, if you set 3 different profiles for live, recording and network profile, one camera will produce video streams
• ONVIF Address / RTSP URL : Enter the camera's RTSP access address that supports ONVIF or RTSP.
M accordingly, having different stream formats. Especially, note that the live profile may vary depending on the used screen split mode.
For more information about the RTSP address, refer to the manual of each applicable network camera. ` For cameras, if applied with one profile only, the produced frame rate is fixed as the profile specifies; if applied with multiple
• ID : Enter the ID for accessing via ONVIF/RTSP protocol. profiles, produced video stream's frame rate is not guaranteed. For example, if applied with 2 profiles of 30fps, the camera
may transmit streams at 20fps.
• Password : Enter the password for accessing via ONVIF/RTSP protocol.
• Mode : If <More Detail> button clicked, setup window will appear. Select a mode that is supported by the
network camera in RTSP connection mode.
- TCP : The connection type with the network camera will switch to "RTP over TCP".
- UDP : The connection type with the network camera will switch to "RTP over UDP".
- HTTP : The connection type with the network camera will switch to "RTP over TCP (HTTP)".
- HTTPS : The connection type with the network camera will switch to "RTP over TCP (HTTPS)".

If you want to check the error details of camera registration


If you failed to register a camera, the reason for the failure will be displayed.
• Connection failed due to unknown error. : This message appears if the camera has failed to be registered
due to unknown connection status.
• Due to the camera account locking, access has failed. : When you enter a wrong ID/password 5 times to
login to the camera account, this message is displayed.
Try to log in again after 30 seconds. If the same message appears, you may need to check whether someone
has tried to access your camera account from the outside.
• Connected successfully. : This message appears if the camera is connected successfully.
• Incorrect model information. Provide the correct model information. : This message appears if the
model information provided for registering the camera is incorrect.

English _33
menu setup
ONVIF Setup Relay

In the bottom of the camera addition screen, click on the <ONVIF Setup> button to set additional settings for You can set details of the relay.
cameras with the ONVIF protocol. • Digital Output : You can select a digital output channel.
` You can change the information only if the user account (camera account used for camera registration) is used to read the user • Relay Mode : Select either bi or mono stable modes.
information and a connection is made with the admin privilege.
• Relay Idle State : Select either open or closed relay standby modes.
• Delay Time : Select the relay operation waiting time.

Event
You can set details of the event.
• Available events (camera) : It shows the list of all the events supported by a camera by using the ONVIF
protocol.
• NVR supported events : You can map the list of events supported by a camera to events that the NVR can
detect. There is no default value. It only shows the value sent by a camera.

Camera Setting
You can change the video settings of a registered network camera for each channel.
Profile
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ► Ö <Camera> Ö [ENTER] Ö ▼►
• CH : It shows the list of registered camera with the ONVIF setting. Ö <Camera Setup> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]
• Add Profile : You can add camera profile.
After adding a profile, click on the <OK> button to add it to the list.
• Delete : After selecting the profile to delete, click on the <Delete> button to delete the selected profile.
• Profile information : You can set the details of the selected profile.
After finishing setting each item, click on the <OK> button to save changes.
User
• Add User : You can add a camera user.
After adding a user, click on the <OK> button to add them to the list.
• Delete : After selecting the user to delete, click on the <Delete> button to delete the selected user.
• User Information : You can set the details of the selected user. • Add : You can add camera profile. Click on the Add button to launch the addition window.
Enter the information and click on the <OK> button to add it to the list.
Network • Delete : You can delete the selected profile from the list.
• Select Camera : Select the camera channel to change the video transmission settings.
You can set the details of the network.
• Profile : Show a video profile for the connected camera.
• IP Type : Select from either the IPv4/IPv6 IP types.
• Codec : Show the codec information for the selected profile.
• DHCP : Select whether to use the DHCP.
• Resolution : You can change the resolution of the selected profile.
• DNS / NTP Server : Only if the DHCP setting is <ON>, the DHCP checkbox will be activated.
• Frame Rate : You can change the baud rate of the selected profile.
` If the DHCP is checked, you can manually enter the IP address. • Bitrate Control : You can change the bit rate for video transmission of the selected profile.

34_ menu setup


` If you change the settings of a specific profile for each model, the effective range of the baud rate may be changed accordingly.
M Ex) if you set the baud rate of the first profile to 30fps, the send rate of the second profile will be changed to 15fps.
Special
DIS (shaking compensation), use of Defog levels can be set.
` Menu options other than codec, resolution and transmission rate can be configured in the settings menu of the network
camera. Focus
` If you change the current profile settings, you may encounter an interrupted playback on the recording or live screen for a You can adjust the focus of you camera's video.
certain time. Items of Simple Focus and Focus-Initialize Setting can be set.
` Changes made in Camera Setup page are applied immediately, while changes made through the camera's web page may Flip

● MENU SETUP
require up to 3 minutes.
Mirror and flip modes can be set.
After finishing with setting camera, click on the <Close> button to move back to the previous screen.
Setup
In the bottom of the camera setting screen, press the <Setup> button to set your camera while watching the Dewarping Setup
live video of the selected camera. Press <Dewarping Setup> at the bottom of the camera settings screen and a distortion correction settings
window for each channel is prompted.

Dewarping Setup
CH6

Profile View type


Live4NVR Dewarp View
Rec4NVR Source View
MOBILE Source View

The camera may be rebooted when changing the mounting mode.

Mounting mode Ground

View Quad View

OK Cancel

` SUNAPI (Samsung Unified Network API) : Camera that supports the communication protocols provided by Hanwha Techwin
M 1. Camera supporting SUNAPI.
2. A camera connected with admin privileges. • Profile/View type : You can select the view type of profiles, except for fixed profiles (SourceMJPEG,
3. A camera connected to Samsung protocols. SourceH264, DewarpMJPEG, DewarpH264) whose settings can't be changed, in the profile list on the
In the above cases, you can use the function. distortion correction settings pop-up window.

` For more details on camera settings, refer to the camera user manual. • Mounting mode : You can change the fisheye installation type. You can select a view mode from among
Settings and operational spec vary depending on each camera. CEILING/GROUND/WALL depending on the installation location.
• View : You can change the fisheye view mode of the current screen according to each split section.
` This function is not supported in some models.
` If there is no camera registered in the NVR that supports fisheye view, <Dewarping Setup> will not be available.
SSDR
M
If there is a significant difference between the dark and the bright areas, increase the brightness of the dark
areas to maintain the level of brightness of the entire area.
Mode, level, D-Range can be set.
Backlight
You can view both bright and dark areas.
Mode, WDR level, WDR black/white levels can be set.
Exposure
You can adjust the exposure of your camera.
Brightness control, shutter, SSNR, Sens-up, shutter/lens, and gains can be set.
Day/Night
You can change the mode to adjust the color and contrast.
Mode, switching time, brightness change, alarm time, alarm input/output, negative color, daytime/nighttime
switching and simple focus, and activation time can be set.

English _35
menu setup
Setting Camera Password Live Setting
You can change the passwords of all registered cameras at once. You can change the live transfer settings of the network camera.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ► Ö <Camera> Ö [ENTER] Ö ▼► [MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ► Ö <Camera> Ö [ENTER] Ö ▼►
Ö <Camera Password> Ö [ENTER] Ö ▲▼◄► Ö [ENTER] Ö <Live Setup> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]

• New P/W : Input a new password according to the password setting rules. • Live Replacement : You can select the live profile setup mode.
If you select <Manual>, the profile setup items are enabled, and you can change settings manually.
• Confirm P/W : Input the new password again.
- Auto : In case of split mode, the profile for live monitoring shows the Live4NVR profile(basic: H.264 800*600
30fps) created at the time of registration and it automatically selects the second profile in case of single
` If you click <
M >, a basic guide for password setup is displayed.
mode.
` If <View password> is selected, the password is no longer hidden on the screen when you type it. - Manual : Live monitoring is performed with the profile selected by the user from the registered camera
` A camera password registered with ONVIF and RTSP cannot be changed. profiles.
- Record : Live monitoring is performed with the profile set for recording.
Password setting guide • Profile : You can select the video profile of the connected camera setting.
• Codec : Show the codec of the selected recording profile.
The length and limitations of a password are as follows.
• Resolution : Show the resolution of the selected profile.
- Uppercase letters/lowercase letters/numbers/special characters, containing at least 3 out of the 4 character
types mentioned: 8 or 9 digit combination • Frame Rate : Show the frame rate of the selected profile.
- Uppercase letters/lowercase letters/numbers/special characters, containing at least 2 out of the 4 character
types mentioned: 10 to 15 digit combination
- The password shall not be identical to the user ID.
- To enhance security, it is not recommended to use repeated digits or letters, or keyboard patterns as a
password.
- Special characters accepted for a password : ~`!@#$%^*()_-+=|{}[].?/

36_ menu setup


Channel Setting Storage Device
You can configure the video settings for each channel. You can check information on storage devices.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ► Ö <Camera> Ö [ENTER] Ö ▼►
Ö <Channel Setup> Ö [ENTER] Ö ▲▼◄► Ö [ENTER] Device/Format
You can check storage devices and their capacity, usage as well as status.
HDD, USB (memory or HDD) can be connected as a storage device.

● MENU SETUP
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ►▼ Ö <Storage Device> Ö
[ENTER] Ö ▼ Ö <Device/Format> Ö ▲▼◄► Ö [ENTER]

• Apply to CH : If you select <Apply to CH>, the "Apply to CH" confirmation window will appear.
After selecting channels that the settings will be applied to, click on <OK> to apply them to the selected
channels.
• Video
- <ON/OFF> : You can turn ON/OFF the selected channel's camera.
• Storage Status : Displays the working status of a storage device.
- <Covert1> : Shows information other than the video of the selected channel.
For privacy protection, it does not display the video while the recording continues. - Red : Displays the situation of video loss.
- <Covert2> : Shows nothing but an empty screen while the recording continues. - Green : Displays the normal situation without video recording losses.
- Status
` If the channel is set to <Covert1> or <Covert2> mode, the channel's sound is not hearable. ` Full BPS : Displays the current rate of recording.
M However, the channel's sound is recorded if its Audio setting is set to <ON>, even the sound is not heard in Live mode.
` Current Loss Rate : Displays the current recording loss rate.
• Audio
` Max Loss Amount : Displays the maximum amount of losses up until now.
- If set to <ON>, you can turn the audio of the channel ON/OFF on the Live screen.
` If the recording loss persists, please refer to the "Troubleshooting" in order to perform checks. (Page 82)
- If set to <OFF>, the channel's audio is off on the Live screen and not recorded.
• Camera Name : Provide a camera Name. • No. : You can check the designated number for the built-in HDD.
` You can enter up to 15 characters including space. ` If you want the find out about the location corresponding to the HDD number, refer to the <HDD Map>. (XRN-410S no HDD map)
• Capacity : Displays the amount of storage device use and the full capacity.
• Usage : Designate the purpose of use for a storage device. (However, only the display function is available for
ARB)
` If the state of use is in "Not Defined", format the HDD before use.
• Status : Displays the current working condition of a storage device.
For inspection or replacement of HDD alarms, please refer to "HDD Alarm Setting." (Page 38)
- Normal : It is displayed during normal operation.
- Inspection : Operating with partial problems.
- Replacement : It is displayed when you can no longer use it.

English _37
menu setup
• Temperature : You can check the temperature of the HDD mounted in the NVR. HDD Alarm Setting
• Time : Displays the use time of an HDD.
For HDD malfunctions, you can set the inspection alarm output terminal, the replacement alarm output terminal
• Format : Select a device and click on format after which a format confirmation window appears. and the alarm time.
Click on the <OK> button to format the selected storage device.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ►▼ Ö <Storage Device> Ö
` Formatting will delete all the recording data that has been saved. Be careful. [ENTER] Ö ▼► Ö <HDD Alarm> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]
J
` While formatting is ongoing, you cannot record video.
` Do not remove a formatting device until it is finished.
` After installing an HDD, if the state of use of the HDD is "Not Defined", format the HDD before use. (If the warning message
persists after formatting, replace the HDD with a new one)
• ARB : Video that was not recorded due to a camera disconnection can be backed up after the connection
with the camera is re-established. Press the button and an <Auto Recovery Backup> window is opened.
- For ARB storage : Select a storage device to be set to ARB.
- Select ARB channel : Select a channel to run the ARB.
` You can select multiple channels.
If you select <All CHs>, all channels will be selected.
• Alarm
- ARB bandwidth : Select a bandwidth for the ARB function. - If <All> was selected, both beep sound and alarm signal through rear side ports will output.
- If <BEEP> was selected, a beep will sound.
` Only our camera products (SUNAPI version 2.3.2 or higher) support the ARB function. To use this function, the camera will
M need to record video on the SD card. - Alarm signal will output through the alarm out port on the rear side when selected <1>, <2>, <3>.
• Check Alarm Output Port : If HDD generates check alarm, the alarm signal will output to the specified alarm
` The maximum bit rate value for the profile used in camera SD card recording should be set to under 6144kbps. The detailed
output port.
information on how to set the profile for SD card recording can be found in the camera manual.
• Replace Alarm Output Port : If HDD generates replace alarm, the alarm signal will output to the specified
` To use the ARB function correctly, both the camera and NVR should be time synchronized with the time server. (Page 26) alarm output port.
` ARB function is activated when NVR starts/when the channel camera set is reconnected/when an NVR recording missing • Duration : Sets the alarm duration for the alarm signal and beep sound.
section recurs at regular intervals after NVR starts.
` NVR recording missing section that can be restored with the ARB function is for 24 hours backwards from the point when the ` <Check> status means that the HDD is operating but it has problems that require technical examination.
ARB function is activated. M ( ) appears on the Live screen.
` You can check which channels have ARB function activated through the message on each channel screen that is displayed ` <Replace> status means that the HDD has defect and requires immediate replacement.
when selecting a channel. (Page 19) ( ) appears on the Live screen.

• HDD Map : You can check the location according to the assigned number for the HDDs installed inside.
(XRN-810S)
` Refer to this when servicing or installing an additional HDD.

` Do not add or remove an HDD while NVR is running.


J

38_ menu setup


Remote Devices Monitor
You can adjust the ID for a remote control to be used in connection with NVR. You can set the information displayed on the monitor as well as the output system.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ►▼ Ö <Remote Device> Ö


Monitor settings
[ENTER] Ö ▲▼◄► Ö [ENTER]
You can configure the monitor output-related settings including the displayed information, dwell time and output
system.

● MENU SETUP
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ►▼ Ö <Monitor> Ö ▲▼◄► Ö
[ENTER]

• Remote control: Select whether to use a remote control.


• ID: Select an ID number linked to a camera.
If the remote control ID does not match, it will not operate properly.

` To change the remote control ID, refer to "Changing the Remote Control ID". (Page 8)
M • Event Display : Sets the dwell time of the event channel display on the monitor when an event occurs.
If you set <Continuous>, it will keep displaying until you cancel it.
• Display : Displays only checked items on the monitor screen.
• Sequence switching time : Set the automatic switching time for the segmented screen in live mode.
• Video Output : Set the resolution for the video output.
If you press the [STOP (@)]  [ZOOM]  [STOP (@)]  [ZOOM]  [MENU] button on your remote control,
the basic resolution pop up will appear. You can adjust the desired resolution in it.
` If the changed resolution is not supported by the monitor, the video may not be displayed properly. If this is the case, the screen
will restore the default resolution after a certain time. Then, you can change it to a different resolution.

To adjust the display position


Some monitors many not display information (camera name, icon, time information, etc.) about the NVR,
depending on the condition. Then, you can change the display position of the data.

FULL NO

F F F

F F F

F F

1. From the monitor setup menu, select <Display Position Setup>.


2. Using the number button to adjust the screen that is cut off.
3. Press <OK>.
` If you operate at 60Hz with 4K resolution, the screen may not be able to display. Please check whether your TV supports
M 30Hz.

English _39
menu setup
Text Event Settings
You can set up event keywords.
Device and events can be set up.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ►▼ Ö <Text> Ö [ENTER] Ö ▼ ►Ö
Device Settings <Event> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]
Relevant values of a device connected to NVR can be set.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Device> Ö ►▼ Ö <Text> Ö [ENTER] Ö ▼ Ö


<Device> Ö ▲▼◄► Ö [ENTER]

• Total amount : Set a total amount condition to receive alarms.


• Keyword : If the <Add> button is clicked, a screen to add keywords pops up. If you select one of the added
keywords to delete and click the <Delete> button, the selected keyword will be deleted.

• Device : Enter the user's desired name


• Use : Select whether or not to use SETTING THE RECORDING
• CH : Select a channel to add a device from a channel table.
• Port : Display a port number that is set You can setup scheduled recording, event recording and other recording related settings.

• Encoding type : Select an encoding type to use from a list.


Recording Schedule
- You can select starting and ending character strings.
Make your reservation on a date and time to schedule the recording on specified time.
` General characters, special characters, and Hex codes (e.g. 0x12, 0x34) can be used for character strings.
M [MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Record> Ö ► Ö <Recording Schedule> Ö
` Equipment connected to NVR uses TCP/IP communication protocol. [ENTER] Ö ▲▼◄► Ö [ENTER]
J

• All : The entire time range (Monday through Sunday including holidays, AM 0~ PM 23) will be reserved with
the same recording schedule
• Apply to CH : If you select <Apply to CH>, the "Apply to CH" confirmation pop-up window will appear.
After selecting channels that the settings will be applied to, click on <OK> to apply them to the selected
channels.

` Event recording and scheduled recording starts about 3 seconds prior to the event/schedule for guaranteed recording.
M

40_ menu setup


Record setting by the color • Event : When an event occurs, you can set which point you will start or stop recording.
- Pre : When an event occurs, recording will be started regardless of the time set.
Color Function Description
If you set it to five seconds, recording will start at five seconds before an event occurs.
No Color No Recording No schedule / event recording
- Post : When an event occurs, recording will continue after the time set.
Green Continuous Scheduled recording only If you set it to five seconds, recording will continue for a further five seconds after an event is finished.
Orange Event Event recording only • Audio : Specify whether to record the sound received from the camera or not.
White Both(Cont&Evnt) Both scheduled / event recordings

● MENU SETUP
` If a channel's data transfer exceeds defined allowed limit, then it may affect to other channels, and may force switching to
Each press of a selected cell will cycle through <No Recording>-<Continuous>-<Event>-<Both(Cont&Evnt)>.
M <KEY> recording even when the channel is configured to <FULL> recording mode. For Key Frame recording channels, the
icon for limited recording appears on the live screen's top side.
But if the sum of the limits is below the max limit, you can still receive the entire frames despite exceeding the permitted
Record Setting bitrates for each channel.
You can set resolution, IPS, and quality of recordings by channel, and by recording type of standard / event. ` A channel displayed in yellow indicates that the recorded data is not being transferred from the camera and that the recording
You can check frame rates and data transfer amount of Full Frame and Key Frame recordings for each channel, is being performed temporarily using another profile on the camera.
and set the transfer limit for recordings. Check the channel information to see the applied profile to the channel listed in yellow.
A channel displayed in orange indicates that the amount of inputted data is greater than the permitted data amount.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Record> Ö ►▼ Ö <Record Setup> Ö In this case, it is impossible to record all of the incoming frames.
[ENTER] Ö ▼ Ö <NVR> Ö ▲▼◄► Ö [ENTER] Instead, only part of the frames (1 or 2 frames per second) can be recorded. To resolve this issue, you must set the permitted
data amount to be greater than the amount of inputted data.
Refer to notes on "Record status". (Page 20)

Setting the network camera's recording profile


You can configure the video profile settings for instructing the network camera (connected to each channel) to
make recording.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Record> Ö ►▼ Ö <Record Setup> Ö


[ENTER] Ö ▼► Ö <Camera> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]

• Apply to CH : If you select <Apply to CH>, the "Apply to CH" confirmation window will appear.
After selecting channels that the settings will be applied to, click on <OK> to apply them to the selected
channels.
• Standard, Event : Configures Standard recording and Event recording.
- FULL : Records all frames fed by the camera.
- KEY : Records only key frames fed by the camera.
Actual recording rate may differ from camera settings. In general, 1 to 2 frames per second are recorded.
- OFF : No recording is made.
• Frame
- FULL : Shows the amount of data for all the scene recordings.
` You can configure the settings only for the profiles that are supported by the camera.
- KEY : Shows the amount of data for the main scene recordings. M
` If the profiles used for recording and network are different, camera's video feed may not comply with the frame rate as
• Limit : Set the amount of data allowed for input for each channel.
specified in the camera.

• Profile : Select a record profile for the connected camera.


• Codec : Show the codec information for the selected record profile.
• Resolution : Display the resolution for the selected record profile.
• Frame Rate : Display the baud rate for the selected record profile.

English _41
menu setup
Record Option SETTING THE EVENT
When the HDD capacity is full, you can set whether to stop recording or start overwriting. You can make the setup for record in case of sensor detection, camera event or video loss detection.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Record> Ö ►▼ Ö <Record Option> Ö


[ENTER] Ö ▲▼◄► Ö [ENTER] Sensor Detection
You can set the sensor's operating condition and connected camera, as well as alarm output and its duration.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Event> Ö ► Ö <Sensor Detection> Ö


[ENTER] Ö ▼ Ö <NVR> Ö ▲▼◄► Ö [ENTER]

• Disk End Mode : Select a HDD repetitive recording type.


- Overwrite : If the HDD is full, this will overwrite the existing data and keep recording.
- Stop : If the HDD is full, this will stop recording automatically.
• Disk End Beep : If you select <Stop> for the disk end mode, this button will be active. Specify the use of
beep when the HDD recording ends. • Apply to other sensors : If you select <Apply to other sensors>, the "Apply to other sensors" confirmation
If you check it, the beep will sound on the disk full and the recording stops. window will appear.
After selecting channels that the settings will be applied to, click on <OK> to apply them to the selected
• Auto Delete : If you check this option, the period list box is active. Specify the deletion period to delete any channels.
earlier data than the specified date. However, you can search for data from the current time to the selected
date. • Sensor Operation : Sets the operation mode of sensors.
` You can select a channel and set a different recording duration for each channel. ` In the <Camera> tab, you can set whether or not to use a sensor.
- <N.O (Normal Open)> : Sensor is opened. If the sensor is closed, it generates alarm.
• Apply to CH : If you select <Apply to CH>, a confirmation dialog window is opened.
Select a channel to apply the applicable settings then press <OK>. The settings will be applied to the - <N.C (Normal Close)> : Sensor is closed. If the sensor is open, it generates alarm.
selected channel. • Cam : Select a channel to be connected to the sensor.
If selected camera, "Cam Preset setup" window appears.
` If you press <OK> when you have completed your settings, all the existing data earlier than the specified period will be
J deleted automatically. So it is recommend to backup the previous data if necessary for later use.
Select a channel and setup the preset.
` Preset setup can be done in PTZ mode.
• Alarm out : Sets the alarm output method.
` For further information on alarm output, refer to "HDD Alarm > Alarm". (Page 38)
• Duration : Sets the duration of alarm signal and alarm sound.

` If you select <Camera> tab, you can configure the sensor operation settings of the network camera connected to each
M channel.
` If the connected network camera that has configured the alarm in/out settings triggers an alarm, NVR will perform the alarm out.

42_ menu setup


Camera Event Video Loss Detection
You can set the activation of events (motion detection, video analysis, audio event) sent from the camera, alarm You can set the camera so that the camera can trigger the alarm if it is disconnected or the video is lost due to
output method and alarm time. unstable network connection.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Event> Ö ►▼ Ö <Camera Event> Ö [ENTER] [MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Event> Ö ►▼ Ö <Video Loss Detection> Ö
Ö ▲▼◄► Ö [ENTER] [ENTER] Ö ▲▼◄► Ö [ENTER]

● MENU SETUP
• Apply to CH : If you select <Apply to CH>, the "Apply to CH" confirmation window will appear. • Apply to CH : If you select <Apply to CH>, the "Apply to CH" confirmation window will appear.
After selecting channels that the settings will be applied to, click on <OK> to apply them to the selected After selecting channels that the settings will be applied to, click on <OK> to apply them to the selected
channels. channels.
• Camera Event : Select whether to use an event detection. • Video Loss State : Specify the use of video loss detection.
• MD : Select whether or not to use motion detection from camera. • Alarm Out : Select an alarm output method.
• Smart Search : Enables or disables the Smart Search option. ` For further information on alarm output, refer to "HDD Alarm > Alarm". (Page 38)
` To use the smart search function, the smart search option must be set to <ON>. Refer to “Smart Search” (page 52). • Alarm Duration : Specify the duration of the alarm output with the beep.
• Cam : Select an event detection channel. If you select a camera item, the "Camera preset" screen will
appear. Select a channel to connect and set the preset.
` You can set the preset in PTZ mode.
• Alarm : Select the method for alarm output.
` For more details, refer to "HDD alarm > Alarm". (Page 38)
• Alarm Duration : Set the duration of alarm.
• Camera MD : You can set the detailed setting of motion detection for a network camera connected.

- Mode : Set the motion detection mode.


- Area : Click on <Setup> and when the detailed setup menu appears, set the motion detection area.
- Sensitivity : Set the sensitivity for motion detection. (very low/low//medium/high/very high).
- Size : Click on <Setup>. When the detailed setup menu appears, set the max/min size of the object to be
detected.
- Activation Time : Select the operation time of motion detection.
After finishing with setup, click on the <OK> button to move back to the previous screen after saving the setup.

English _43
menu setup
Alarm Out Schedule NETWORK CONFIGURATION
You can set the conditions and operating hours for scheduled alarms. It provides networked monitoring of Live screen from a remote place, and supports mail forwarding function with
events. You can configure the network environment which enables such functions.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Event> Ö ►▼ Ö <Alarm Out Schedule> Ö
[ENTER] Ö ▲▼◄► Ö [ENTER]
Interface
You can set the network connection route and protocol.

Setting a network connection


Sets the protocol and environment of the network.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ► Ö <Interface> Ö [ENTER] Ö ▼


Ö <Network> Ö ▲▼◄► Ö [ENTER]

• Alarm Out : Sets the alarm output method.


` For further information on alarm output, refer to "HDD Alarm > Alarm". (Page 38)
- <ON> : Marked in green, and always generates alarm on scheduled time.
- <OFF> : Marked in black, no alarm is generated even if an event occurs.
- <Event Sync> : Marked in orange, generates alarm only when an event occurs.
• Apply to All Alarm out : Applies the configured schedule to all alarms.

` When the alarm is generated on the scheduled time, you can stop the alarm by canceling the schedule.
M • Network 1 (Camera) : Port recommended for camera connection, which receives a image from the camera.
• Network 2 (All) : Port recommended for connection with a network, web viewer.
• Network 1 (Camera) / Network 2 (All) setup
- IP Type : Select a network connection type.
- IP Address, Subnet Mask, Gateway, DNS
<Static> : You can manually enter IP address, subnet mask, gateway and DNS.
<DHCP> : IP address, subnet mask and gateway values will be automatically set.
<PPPoE> : IP address, subnet mask and gateway values will be automatically set.
- User ID, Password : If you set the connection mode to PPPoE, you need to enter "User ID" and
"Password" to register in PPPoE.
• Transfer bandwidth : Enter the maximum amount of upload data bandwidth.
Check the assigned setting in Connection Mode before entering your value.
• Default Gateway : Set the basic gateway by using Network1 / Network2 setup.

` You can manually input DNS of <DHCP> and <PPPoE> when it selected to <Manual>.
M

44_ menu setup


Connecting and Setting the Network • Setting the DHCP IP Address of the Broadband Router

Networking may differ from the connection method, check your environment before setting the connection 1. To access the Broadband Router's configurations, open a web browser on the local PC that is connected
mode. to the Broadband Router and enter the router's address (ex : http://192.168.1.1).
2. At this stage, make the local PC's windows network configurations to the below example :
When no router is used Ex) IP : 192.168.1.2
• Static mode Subnet Mask : 255.255.255.0
Gateway : 192.168.1.1

● MENU SETUP
- Internet connection : Static IP, leased line, and LAN environments allows connection between the NVR and
remote user. - Once connected to the Broadband Router, it prompts with password. While entering nothing to the User
Name field, enter "admin" into the password field and press <OK> to access the router configurations.
- NVR Network Settings : Set the <Network> in <Interface> menu of the connected NVR to <Static>.
- Access the router's DHCP configuration menu and set its DHCP server activation, and provide the start
` Consult your network manager for IP, Gateway and Subnet Mask. and end address.
Set the start address (192.168.0.100) and end address (192.168.0.200).
• DHCP mode
` Above steps may differ from the router devices depending on the manufacturer.
- Internet connection : Connect the NVR directly to a cable modem, DHCP ADSL modem or FTTH network. M
- NVR Network Settings : Set the <Network> in <Interface> menu of the connected NVR to <DHCP>.
Port Setting
• PPPoE
- Internet connection : An PPPoE modem is directly connected to the NVR, where the PPPoE connection [MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ► Ö <Interface> Ö [ENTER] Ö
requires user ID and password. ▼► Ö <Port> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]
- NVR Network Settings : Set the <Network> in <Interface> menu of the connected NVR to <PPPoE>.
` PPPoE <User ID> and <Password> should be the same to the PPPoE user information.
If you don't know the ID and password, consult your PPPoE service provider.

When a router is used

` To avoid IP address conflict with the NVR's static IP, check followings :
J
• Setting the NVR with a static IP
- Internet connection : You can connect the NVR to a router which is connected to an PPPoE/Cable modem
or a router in a Local Area Network (LAN) environment.

• Setting the NVR Network • Protocol Type : Select the protocol type among TCP, UDP - Unicast and UDP - Multicast.

1. Set the <Network> in <Interface> menu of the connected NVR to <Static>. • Device Port : Enter the connectable port number. Initially, <554> is set.
- TCP : It has better stability and lower speed when compared to UDP, and recommended for internet
2. Check whether the set IP address is in the static IP range provided by the Broadband Router.
environments.
IP Address, Gateway, and Subnet Mask : Consult your network manager.
` Check whether the set IP address is in the static IP range provided by the Broadband Router. • UDP Port : Initially, <8000~8159> is set. It increases / decreases by 160.
- UDP : It has less stability and faster speed when compared to TCP, and recommended for local area
` If a DHCP server is configured with starting address (192.168.0.100) and end address (192.168.0.200), you should set the network (LAN) environments.
J IP address out of the configured DHCP range (192.168.0.2 ~ 192.168.0.99 and 192.168.0.201 ~ 192.168.0.254). • Multicast IP Address : User can directly input.
3. Check the Gateway address and subnet mask are equal to those set in the Broadband Router. • Multicast TTL : Select from 0 ~ 255. Initial value for the TTL is set to <5>.
• HTTP Port : Enter the port number for the Web Viewer. Initially, it is set to <80>.
• Send SSL : Select this option to send SSL.
• Backup Bandwidth : Select the degree of backup bandwidth.

English _45
menu setup
DDNS DDNS Setting
If a remote user accesses the network, you can set whether or not to use DDNS and the site to be connected. DDNS is a short form of Dynamic Domain Naming System.
DNS (Domain Name System) is a service that routes a domain name consisting of user friendly characters (ex :
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <DDNS> Ö [ENTER] Ö ▼ www.google.com) to an IP address consisting of numbers (64.233.189.104).
Ö <Network 1> Ö ▲▼◄► Ö [ENTER] DDNS (Dynamic DNS) is a service that registers a domain name and the floating IP address with the DDNS
server so that the domain name can be routed to the IP address even if the IP is changed in a dynamic IP
system.

• Setting DDNS in the NVR


Set <Protocol Type> in the <Protocol> menu of the connected NVR to the following :
Ex) Protocol Type : TCP
Port (TCP) : 554, 555, 556, 557, 558
DDNS Site : hanwha-security.com

• DDNS Settings of the Router


Select the corresponding menu for the network transfer protocol of the router.

• DDNS Site : Specify the use of DDNS and select a site that you registered. • Setting up UPnP of Router
• Host Name : Provide the host name that you registered with the DDNS site. Refer to the router's documentation to enable the UPnP function of the router.
• User Name : Provide the user ID that you registered with the DDNS Site.
• Password : Provide the password that you registered with the DDNS site.
IP Filtering
` Refer to "Using Virtual Keyboard". (Page 27)
M You can prepare the list of IP addresses to allow or block access to a specific IP address.
` If you select <OFF>, the input box will be inactive.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <IP Filtering> Ö [ENTER]
` If you select <hanwha-security.com>, the host name input box will be inactive. Ö ▲▼◄► Ö [ENTER]
• Quick Connect : Appears if the <hanwha-security.com> is selected for a <DDNS Site>.
To use the function, set to <Use> after connecting the NVR to a UPnP router.

` If canceled during Quick Connect configuration, it automatically switches to <Not Use> and saved.
M
To check Quick Connect status
A progress bar and its message appears for a Quick Connect.
• Quick Connect Success : Message for a successful connection.
• Invalid Network Configuration : Message appears if the network configuration is not valid. Check the
configuration.
• Please enable UPnP function of the router : Message appears if the router requires UPnP function • Filtering Type :
enabled. - Deny : If you select reject, access to the registered IP address will be limited.
• Failed to find the router : Message appears if the router is not found. Check the router's configurations. - Allow : If you choose permit, then they can only access the registered IP addresses.
• Please restart the router : Message appears if the router should be restarted. • Use : Select the checkbox for the IP address that will use IP filtering.
• IP Address : Enter the IP address for filtering.
• Filtering Range : If you enter an IP address or prefix, then the range of IP addresses blocked or permitted will
be displayed.

` If a camera's IP address is not included in the Permit list or is in the Reject list access to it will be rejected.
J
` Camera IP filtering through PoE port is not applied to IPv4. (The existing connection is maintained, and filtering is applied to
subsequent connections.)

46_ menu setup


SSL 802.1x
You can select a security connection system or install public certificates. When connecting to a network, you can select whether to use the 802.1x protocol and install a corresponding
certificate.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <SSL> Ö [ENTER] Ö 802.1x is a certificate system for the server and the client. It can guarantee robust performance against hacking
▲▼◄► Ö [ENTER] into the Tx/Rx network data, virus or information leaks.
By using this system, you can block access from a client who is not certified and only allow communication to

● MENU SETUP
certified users and thus increase the level of security.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <802.1x> Ö [ENTER] Ö ▼


Ö <Network> Ö ▲▼◄► Ö [ENTER]

• Secured Connection System : You can select a type of security connection system.
- HTTP (Non-secured connection)
- HTTPS (Secured connection using unique certificate)
- HTTPS (Secured connection using public certificate)

` If the NVR device is connected to the external internet or installed in an environment with high priority for security, making a
J secure connection is recommended. • EAPOL Version : Select the EAPOL version to be used as protocol.
` Some switch hubs will not operate if you set them to version <2>. Select version <1>.
• Install Public Certificate : You can scan and register public certificates to be installed.
If you want to use a certificate, you need to install a certificate file along with and an encryption file. • ID : Enter the ID provided by the RADIUS server administrator.
` The <HTTPS (Secured connection using public certificate)> menu can be selected only if there is a registered public ` If the entered ID does not match the ID of the client's certificate, it won't be processed properly.
certificate. • Password : Enter the password provided by the RADIUS server administrator.
` If the password you entered does not match that of the client's private key, it won't be processed properly.
• Certificates : Search for a device. Click on <Rescan> to search for a device again.
• CA Certificate : Select this only if your public certificate includes the public key.
• Client Certificate : Select if the public certificate includes a client's authentication key.
• Client Private Key : Select it if the public certificate contains the client private key.

` For successful implementation of the 802.1x operating environment, the administrator must use the RADIUS server.
M In addition, the switch hub connected to the server must be a device that supports 802.1x.
` If the time setting of the RADIUS server, the switch hub and an NVR device do not match, communication between them can
fail.
` If a password is assigned to the client's private key, the server administrator should confirm the ID and password.
The ID and password allow up to 30 characters each. (But it only supports letters, numbers and special characters ("-", "_",
"." 3 types) only.
Accessing non password-protected files is allowed without entering a password.
` The 802.1x protocol adopted by the NVR is EAP-TLS.
` You need to install all three certificates to use 802.1x.

English _47
menu setup
Live Streaming Setting • Server Address : Enter the SMTP server address to connect to.
• Port : Sets the communication port.
You can set the video profile transmitted to the network.
• Use Authentication : Check this if the SMTP server uses user authentication.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <Live Streaming> Ö The account input box will be activated.
[ENTER] Ö ▲▼◄► Ö [ENTER] • ID : Enter a ID to use authentication when connecting to the SMTP server.
• Password : Enter the password of the SMTP server user.
• Secure Transfer : Select one from <Never> and <TLS (if available)>.
• Sender : Use the virtual keyboard to enter the sender's e-mail address.
` Refer to "Using Virtual Keyboard". (Page 27)
• E-mail Test : Conducts the test on the server settings.

Event Setting
You can set the interval and type of the event that will be sent to the user.
• Profile : Select a network profile for the connected camera.
• Codec : Show the codec information for the selected network profile. [MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <E-mail> Ö [ENTER] Ö
▼► Ö <Event> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]
• Resolution : Display the resolution for the selected network profile.
• Frame Rate : Display the frame rate for the selected network profile.

` If the profiles used for network and recording are different, camera's video feed may not comply with the frame rate as
M specified in the camera.

E-mail
You can send an e-mail to a NVR-registered user at a specific time interval, or if an event occurs.

SMTP Setting • Event Interval : Set the event interval.


` If a series of events occurs, the e-mail will be sent at the specified interval, not on each event.
Sets the SMTP mail server.
• Use Event Transfer : Select an event type to send if an event occurs.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <E-mail> Ö [ENTER] Ö ▼ If the selected event occurs, the e-mail will be sent to the group that has the recipient authority.
Ö <SMTP> Ö ▲▼◄► Ö [ENTER]

48_ menu setup


Recipient Setting • Enable SNMP v3 : SNMP version 3 is used.
- Password : Set the initial user password for SNMP version 3.
You can create a group and add users to it or you can delete users and change a group.
• Enable SNMP Traps : SNMP trap is used to send important events and conditions to the Admin System.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <E-mail> Ö [ENTER] Ö - Trap Manager : Enter the IP address to which messages will be sent.
▼► Ö <Recipient> Ö [ENTER] Ö ▲▼◄► Ö [ENTER]
` SNMP v3 can be set only if the security connection method is set to HTTPS mode.
J Refer to "SSL" for more details. (Page 47)

● MENU SETUP
DHCP Server
You can set the internal DHCP server and assign an IP address to the network camera.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <DHCP Server> Ö


[ENTER] Ö ▼ Ö <Network> Ö ▲▼◄► Ö [ENTER]

Network Setting
• Click on < > to add a group.
Select a group name and the privilege.
• Select a recipient group to receive emails.
If a group is added, it will appear in the group list.
• Click on < > to add a recipient.
Select a group and enter names and email addresses.
If a group is created, you can add a recipient.
` For inputting the recipient name and email address, refer to "Using Virtual Keyboard". (Page 27)

SNMP
• Network 1/2 : Select <Setup>, and you can set the IP range operated by the server and time.
Using the SNMP protocol, the system or network administrator can monitor the network devices remotely as
well as the operating environment. ` In PnP mode, Network 2 does not support DHCP Server.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <SNMP> Ö [ENTER] Ö To set the DHCP server
▲▼◄► Ö [ENTER] 1. On the DHCP Server Setup window, click <Setup>.
2. Select <Run> in the <Status> field.
3. Enter the starting IP and end IP in the <IP Range> field.
4. Fill in the <IP Lease Time> field.
5. Click <OK>.
The IP range entered is set as the DHCP server address of the network.

• Enable SNMP v1 : SNMP version 1 is used.


• Enable SNMP v2 : SNMP version 2 is used.
- Read Community : Enter the name of read-only community to access the SNMP information. By default it is
set to <public>.
- Write Community : Enter the name of write-only community to access the SNMP information. By default, it
is set to <private>.

English _49
menu setup
Check IP 3. When the QR code is scanned, the device ID that can be seen in NVR is automatically converted to mobile
viewer ID, and the mobile viewer can be used right away when the ID/password of NVR is entered.
You can check the IP Address and Mac currently used through the DHCP server, and the connected network
4. After this, it automatically connects to NVR and can be monitored easily with a smart phone when running
port.
WiseNet mobile app saved in the smart phone.
[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <DHCP Server> Ö
` The expiration date for the P2P service is three years after the purchase of the product, and the remaining period can be
[ENTER] Ö ▼► Ö <Check IP> Ö [ENTER] Ö ▲▼◄► Ö [ENTER] M checked in mobile FAQ.

• Network : Select the network port to check the information on IP and others.
` In PnP mode, Network can`t choose.

P2P
When using P2P service, NVR can be used by connecting to mobile web viewer.

[MENU] Ö [ENTER] Ö ▼ Ö <Menu> Ö [ENTER] Ö ▼ Ö <Network> Ö ►▼ Ö <P2P> Ö [ENTER] Ö


▲▼◄► Ö [ENTER]

• Enable P2P : Select check box if you want to use P2P service.
• QR Code : Scan QR code by mobile device.

To run the P2P service


1. When <Enable P2P> is checked, the connection test runs to check if it can be remotely connected from
the current NVR.
2. When the connection is successful, search for WiseNet Mobile from the smart phone, and then install and
run it.
` When Add a device > QR code is selected, the NVR QR code can be scanned.

50_ menu setup


search & play
SEARCH 3. The record data on the specific date will be listed.
The display bar is different according to the data type. So check the data type for the color in the left pane.
You can perform the search for recorded data by the time or by the search criteria such as an event.
` If DST (Daylight Saving Time) is configured, overlapping multiple recordings may be produced for a certain moment of time.
You can access the <Search> menu directly in Live mode. M Such a time section is distinguished with red color to mark DST section.
• Go to First : Move to the earliest recording date.
• Go to Last : Move to the latest recording date.

● SEARCH & PLAY


• Time : Enter a time to perform the search or use the up/down button <>> to select one.
• Zoom In : The map enlarges in detail.
It will switch in the sequence of 24hours - 12 hours - 6 hours - 2hours - 1hour.
• Zoom Out : The map will switch in the reverse order of the detailed mode above.
It will switch in the sequence of 1hour - 2 hours - 6 hours - 12 hours - 24 hours.
• Preview : Click <Channel> and select (click, drag) a time in <Duration> to display a still image for the
1. In live mode, right click with the mouse button or press the [MENU] button on your remote control. portion.
The Live menu appears. - If the selected channel does not contain any recorded data, it will be marked black.
2. Select <Search>. 4. Select a data item and click <Play>.
The screen switches to the data playback mode.
3. The Search menu should appear.
4. The search can be restricted by the Auto Delete function. Color indications depending on current recording status
Refer to "Setting the Recording > Record Option". (Page 42)
The recorded data types are represented through the use of different colors. Each color corresponds to a
` Overlapped data : It only appears if there exists overlapped data on a certain time, produced due to the change of NVR's time
M setup. The latest data comes first, from <List0>.
certain recording type.

It does not appear in <Backup Search>.


` The search time is based on the time specified by NVR. Event Search

Time Search You can search for events by the channel and play them.

You can search for recorded data of a desired time.


The displayed time is based on the local time zone and the daylight saving time (DST). Therefore, data recorded
at the same time from different areas may differ based on the time zone and the DST.

1. Select <Event Search> in the <Search> menu.


2. Configure the channel, search date and event type settings.
` Depending on the menu selected, it will search for all/motion detection/video analysis/audio detection/sensors/reservation/
general recording events.
1. Select <Time Search> in the <Search> menu.
2. In the date selection window, click on the < > > button to select a search date. • Date/Time Preview : If you select a data item in the list, the still image of the selected data will be displayed in
the left preview pane.
` For using the calendar, refer to "To use the calendar". (Page 26)
• Event : Displays the type of the event that occurred.
3. Select a data item and click <Play>.
The screen switches to the event data playback mode.

English _51
search & play
Smart Search Text Search
You can select a specific area of the image as an area of interest or exclusion using a virtual line to perform a You can search data that was entered into POS systems connected to NVR.
search of events that have occurred in a specific time period.
` To perform smart search, the <Smart Search> option in <Camera Event> should be turned <ON> and the camera motion event
option must be set to the entire area (page 43).

1. Select <Text Search> from the <Search> menu.


2. Please specify the search criteria and click the <Search> button.
` A deeper and more detailed search can be performed by using specific characters.
1. In the <Search> menu, select <Smart Search>.
• Search characters : Enter characters using a virtual keyboard.
2. Configure the channel, search date and time settings.
• Event Keyword : Search using a condition set in the "Device > Text > Event settings" menu. (Page 40)
• Go to First : Moves to the oldest smart search result.
• Search Condition : Enter a word to search in the input screen and press the <Search> button.
• Go to Last : Moves to the most recent smart search result.
- <Case Sensitive> : If this option is checked, the search terms are case-sensitive.
• Event : Displays the type of event generated.
- <Whole Word> : If checked, only results that exactly match the input words will be displayed.
• Region of Interest : The entire screen is set as a non-detection area and a specific area designated as a
• Time overlap : This is displayed if there is data duplicated during a preset time interval.
detection area. Click and drag on the image or select 4 vertexes to designate a desired detection area.
• Preview screen : If data is selected from a list, a preview image is displayed.
• Exclusive Region : The entire screen is set as a detection area and a specific area designated as a non-
All information is displayed in the text display below.
detection area. Click and drag on the image or select 4 vertexes to designate a desired non-detection area.
• Export : Stores all text search information recored in NVR to storage media.
• Virtual Line : Detects a motion towards a marked direction based on the virtual line. At a desired position on
the screen, click or drag the start point and end point of the line. 3. Select data and <Play>.
` Up to 3 areas of interest, areas of exclusion and virtual lines can be set, respectively. Moves to a replay screen for searched text data.

3. Click the <Search> button.


` Search results displayed include a list, timeline and thumbnail.
` When you double-click a list or thumbnail displayed as search results, the applicable data can be played back.
4. Select data to play and click <Play>.
Moves to the playback screen for the data searched.

52_ search & play


Backup Search ARB Search
Searches for backup data in the connected backup device.
Only data in the format of NVR is included in the search.

● SEARCH & PLAY


1. Select <ARB Search> from the <Search> menu.
1. Select <Backup Search> in the <Search> menu. 2. The type and model name of the ARB storage device are displayed.
2. When storage media with data is connected, the list of recordings stored is displayed on the equipment. When storage media with data is connected, the list of recordings stored and ARB data volume are
displayed on the equipment.
• File Name : Displays the name of a file recorded.
• File Name : Displays the name of a file recorded.
• Channel : Displays the recorded channel.
• Channel : Displays the channel recorded.
• Record Period : Displays the record period.
• Record Period : Displays the duration of recording.
• Play Start Time : Select a time that you start playing.
• Play Start Time : Select the time at which the video is to be played.
3. Select data to play and click <Play>.
The screen switches to the backup data playback mode. • ARB Export Device : Selects an ARB storage device and exports a file.
` Press the < > button and you can check the free space remaining in the storage device.

3. Select data to play and click <Play>.


The screen moves to the ARB backup data play screen.

English _53
search & play
PLAYBACK Using the Playback Button

Play
You can play data stored in the HDD and backup a desired portion of the data.

Name Description

 Play Timeline Indicates the current playback point, and can be used to move.

b Skip Backward Moves backward by unit time.


1. In the live menu screen, select <Play> menu or click on < > in the launcher menu or press the [+]
button on your remote control.
c Backward Fast
Play
Used for quick backward search while in Play.
2. Using the up/down(▲▼) button, select the search menu.
` If this is the first time you try to play, you will start with the data search window.  Backward Slow Play Used for backward frame-by-frame search while in PAUSE.
For data search, refer to "Search". (Page 51)
 Step Backward Moves backward by one frame at a time.
3. Select a data item and click <Play> in the Search menu.
The selected data is played and the play launcher appears on the screen.  Pause Stops playing the current video temporarily.
` If there is an existing data, <Play> will start immediately without performing the search.
 Stop Stops playback and moves to the live screen.
• Playback Information : Displays the date and time of the current data in the top corner.
 Step Forward Moves forward by one frame at a time.
• Backup : Click < > to set the current time to the start time of backup; you can specify a backup area
using the mouse (yellow triangle).
Click < > again to set the current time to the end time of the backup and the "Backup Range" window
 Forward Slow Play
In a split mode, the real time playback may not be supported, depending on the record quality,
resolution and number of channels. And some frame rates may be supported.
appears.
- Type : Supports formats of NVR and SEC.
Forward Fast Play Used for quick forward playback.

` When you select the SEC format, you can select or deselect "Text data included".
Skip Forward Moves forward by unit time.

- Device : Select a backup device. Return Return to the search setup screen.
- Check Capacity : Enables you to check the capacity of the selected storage device.
m Audio Sets Audio ON/OFF.
4. If you want to return to the live screen while playing, click < > on the launcher menu or press the [@]
button on your remote control. n REC Records all channels in Live mode.

This is available in Single mode, which will enlarge the video from a selected channel.
Checking menu while playing a video
ZOOM To cancel the zooming, simply double-click the enlarged image or select <Close Zoom> in the Live
screen menu.
1. Right-click on the play screen.
Screen menu appears on the play screen.
2. Select a menu to run.
Partial Backup
Begins backup of the selected section of the video being played, with the specified starting/ending
point.
For more information about each menu, please refer to the "Split Mode Menu". (Page 17)
q Mode Switch Click on a desirable play mode to change the screen segmentation mode.
` Rotate mode only appears in single screen mode. You can rotate the play screen by 90 degrees.
M

54_ search & play


starting web viewer
WHAT IS WEB VIEWER? CONNECTING WEB VIEWER
WebViewer is a software program with which the operator can access a remote NVR (Network Video Recorder) for 1. Open your web browser and type the IP address or URL of NVR into the URL address box.
real-time monitoring, PTZ control (if configured) or search.
` Accesses the web viewer by connecting to Network 2 (recommended).
M
NETWORK ` "192.168.2.200" is set to IP by default.
` You must have specified the IP address in "Network > Interface".

● STARTING WEB VIEWER


Network Camera ` The URL connection will be enabled only when the DDNS connection settings have been completed.
For more information, refer to "Network Configuration > DDNS". (Page 46)
'9 REC HDD ALARM NETWORK BACKUP POWER

1(7:25.9,'(25(&25'(5 6516

NVR 2. A user with the admin permissions should provide the admin
ID and password. A registered user should provide the user
ID and password.

` The initial ID and password for webviewer is "admin" and "4321".


NETWORK
J When an initial password is entered, while partially resetting to
Remote PC access a web viewer, a pop up window will appear that will guide
the user to change the password and when doing a whole reset to
access a web viewer, a pop up window will appear that will guide
Product Features the user to complete the settings for the Install Wizard.
Set a new password when a pop up window appears.
• Remote connection using the browser
• PTZ camera control enabled ` Please change your password every three months to safely protect personal information and to prevent the damage of the
information theft.
• 4:3 mode : supports 1, 4, 9, 1+5, and 1+7 channels (up to 8 cameras)
Please, take note that it's a user's responsibility for the security and any other problems caused by mismanaging a
• 16:9 mode : supports 6, 12 channels (up to 8 cameras) password.
• Saving function in JPEG/BMP/PNG image format for printing and storage.
• Record video in AVI format-compatible with popular media players. (The integrated codec is needed)
` It allow s up to 10 simultaneous access including the Admin and general users.
• To play the video in Windows Media Player, you must download and install the relevant codec from www. M
windows7codecs.com. (version 4.0.3 or higher) ` Password of the Admin and general users can be changed in <User> menu of the NVR.
` Normal users should have set <Webviewer> under <Restriction on Network Access> to Use before connecting to the
System Requirements Web Viewer. (Page 28)
The following lists the minimum suggested hardware and operating system requirements needed to run the ` All settings are applied by the NVR's settings.
Web Viewer.
3. The plugin installation confirmation pop-up window will
appear.
Item Minimum Recommended

CPU Intel Core 2 Quad 2.5GHz or higher Intel i7 (3.5GHz) or more

RAM 3GB or more 4GB or more

HDD 200GB or more 500GB or more 4. When a program installation wizard window appears, press
the [Install] button to install the program.
VGA Memory 512MB or more 1GB or more ` The version of the program installed may vary depending on the
Display Resolution 1280 x 1024 or higher update version.
5. When program installation is complete, click on the [Finish]
- Supported OS : Windows 7, 8.1, 10, Mac OS X 10.9, 10.10, 10.11
button.
- Plug-in free web viewer
Supported web browsers : Google Chrome 47, MS Edge 20 6. After completing installation and successfully logging in, the
OS main live viewer screen appears.
- Plug-in Webviewer
Supported web browsers : MS Explorer 11, Mozilla Firefox 43, Apple Safari 9 ※ Mac OS X
only

Network 10/100/1000 Ethernet NIC

English _55
starting web viewer
If you want to access the web viewer with multiple browsers Live viewer screen layout
Set auto execution of plugin (npNVRViewer) in the browser menu  
that you first access and refresh the screen after activating the
plugin or selecting plugin reliability.
b 
 Each time the browser is upgraded in the future, the plugin activation
method can be changed. Plug in setting menu can be referred to in the c
browser manual.

` For chrome browsers, "Plug in is not activated. Please select


J 'Always run on this site' and refresh", then select the 'always
execute on this site' button in the top of the browser.

` On a browser in the latest version that does not support plug-ins, please refer to the descriptions about the plug-in free web
M viewer stated below.

Accessing the Plug-in Free Webviewer from a web browser

To log in
1. Open a web browser and enter the IP address of the NVR    
or a URL in the address bar.
Menu Description
2. A user with administrator authority should enter an
administrator ID and password. Displays icons that indicate the screen state of system status.
A regular user should enter a user ID and password.  System Status Display
` For more information about each icon, please refer to "System Status". (Page 58)
3. <Lite ver. Webviewer> check box is selected by default on
a browser that does not support plug-ins. b View Menu Enables or disables View Menu.

` This option is only supported by an Internet browser that does not use Displays the user login ID and moves to the setup page.
plug-ins (e.g. Chrome, Edge Browser) c Select Menu ` The way that you configure settings is identical to the existing web viewer settings. Please
< Chrome, Edge Browser > refer to <Setup Viewer>. (Page 66)
` As the plug-in free webviewer has lower performance than the
J plug-in webviewer, it has a limit on the monitoring of high quality  Changes the camera profile.
profiles.
To monitor high quality profiles, use either a plug-in webviewer or
network Viewer.  Captures the current video and saves it in a designated path.

 Supports the PTZ Digital Zoom function.

 Turns the sound ON/OFF.

< Internet Explorer >  Changes the aspect ratio.

Logout Logs out your account.


 Shutdown Turns off the power of the NVR system.

` Plug-in Free Webviewer only supports a single split live screen. However, output of only up to 720p resolution is available.
M Resolution exceeding 720p will not be displayed. (Exception - H.265 codec is not output if the resolution and frame rate
exceed 720P 26fps.)
` You can change the live screen by selecting <Channel 1>.

56_ starting web viewer


live viewer
LIVE VIEWER Menu Description

You can check the video from camera registered in the NVR connected from a remote PC. Also, you can adjust the Shows the channel information selected.
camera and check the network transfer status. ` If the user's PC monitor does not support 60Hz at a specific high resolution, or the HDMI
Channel information
cable does not support HDMI 2.0, 60fps or higher will not be output from the channel
Live Viewer Screen information.

● LIVE VIEWER
 Freeze
Temporarily stops the videos in all the channels or deactivates the Pause function in
suspending status.
b

c
 Stop Alarm Deactivates an alarm when it occurs.

 OSD Check the OSD item to display the OSD screen information in the web viewer window.

Saves the real-time video, in AVI format, from the selected channel in a designated folder on
 PC recording
the PC.

NVR recording Start and stop NVR recording.

  Layout setting Set the layout.

 Sequence Set the sequence.

  PTZ Controls connect PTZ camera(s).


Runs the fisheye settings for the selected channel.
Fisheye
Menu Description (Configures the mounting mode and the view mode to correct the screen distortion.)

 System Stauts
Indicator
Displays icons to display the screen or system status. Display Pane Displays the video of camera connected to NVR.

b Menu Selection Switches into corresponding menu screen by clicking each menu. Text Turns text devices and data output located in the right side of Search ON/OFF.

Date/channel Shows the access date/time and the selected channel. ID Display the ID of user connected.

Sound Sets the sound connected to each channel to either ON/OFF. Quick setup Simple camera registration and recording settings.

Capture Saves current video for the selected channel in the path designated by the user. Manual backup Manually backup the video of the camera connected.

c Print Prints current video image for the selected channel through designated printer. Status Shows the camera live and recording status.

Image Rotation Rotates the screen of a selected channel by 90 degrees. Help Move to the help window.

Keep ch. scr ratio Changes screen ratio of the selected channel. Logout Performs logout process.

Keep full scr ratio Changes screen ratio for all channels. Shutdown Turn off the NVR system.

Channel change Switches to the previous/next channel group.

 Switch from the full screen to the split screen.


Full screen Press the [ESC] key on the keyboard to exit full screen mode.
` Safari for Mac does not support full screen mode.

English _57
live viewer
LIVE SCREEN CONFIGURATION To capture a screen
1. Click < > button.
System Status When a pop-up window appears, select the saving path for
captured image.
You can check the status or operation of the NVR with the icons on the live screen.
2. Select the path and name the file. And then click the <OK>
 On a plug-in free web viewer, the status information icon is not displayed. button.
3. Save current camera's video image as .bmp, .jpg or .png file.

` If the viewer is running without the administrator's permission in


J Windows 7, you may not save the captured image as .bmp, .jpg or
Item Description .png file.

It is displayed when there is an issue with the recording conditions.

Displayed if the HDD is full and the NVR has an insufficient space to
record.
To print a screen
Displayed if no HDD is installed or the existing HDD should be replaced. 1. Click < > button.
2. Print current camera's video image with the printer
connected to the PC operating the Web Viewer.
Displayed if the HDD needs a technical examination.

It is displayed when the max permitted amount of data for each channel is exceeded.

It is displayed when the network is overloaded. It is displayed when the network is


System Operation
overloaded.
` It occurs when the max receiving performance is exceeded, causing an overload to the
CPU. It will disappear if you modify the camera setting or delete a camera to reduce
the level of performance overload.

It is displayed when there is firmware to update the server. It is displayed when there
is firmware to update the server.

Displayed when the battery that enables time information to be saved in the NVR
equipment is empty.

If you press the screen stop button, it is displayed.

It is displayed when all the channels are switched at the set time interval.

58_ live viewer


Setting the layout If you want to delete the layout
After selecting the layout to delete, click on < >.
If you don't add or save it in the layout after registering a camera, the live screen will not be displayed. The selected layout will be deleted.
Click on the < > button to launch the layout setting screen.
` Unless you press the Save or Delete button, changes will not be
If you want to add a layout M saved.
Click on < >.

● LIVE VIEWER
Set the layout name to add and click on the <OK> button to
add it.
Changing Split Mode
When clicking the Split Mode selection button, the screen is
changed into the selected split mode.
If you want to change the layout name
Select the layout name to change and click on < >.
After changing the name, click on the outside of the layout
window to change the name.

If you want to save the layout


Click on < >.
The changed layout will be saved.

` The layout for each user is saved separately.


M

English _59
live viewer
Setting screen switching To perform switching
If you don't register the layout, the screen switching function will not operate. Click on the <Sequence> button to activate the switching mode
and run a sequence.
You can view the layouts one by one.
Click on the < > button to launch the switching setting window.
1. Select the layouts to be shown in turn by pressing < >.
2. Enter the screen switching time. Auto Sequence

CH1
CH1 8
CH1
CH1 CH1 CH2
CH1 CH1 CH2
CH1 5-8
CH1
CH1 CH3 CH4
CH3 CH4

1 1-4
Single mode
4-split mode

` In a split mode, If you have set <Sequence switching time> in "Device > Monitor", Auto Sequence will be conducted at
M the set interval. (Page 39)
` When switching to another channel, the video may be slightly delayed depending on network status.
` If you perform automatic switching of a single screen, the layout setting menu will be deactivated during operation.

3. Click on the <OK> button to save the designated sequence.

60_ live viewer


How to query text devices and data CONTROLLING A CONNECTED NETWORK CAMERA
Checks the text data transmitted from POS systems that are
connected to NVR. Controlling PTZ
If the < > button is selected, you can turn on/off the
If PTZ camera is connected, the < > icon appears on screen. When selecting corresponding camera
function to query text devices and data located in a separate
channel, the PTZ tab is provided to allow you to control the PTZ.
area.

● LIVE VIEWER
 A queried device should be set in terms of its usage, channel, etc. by
selecting "Device > Text > Device". (Page 40)
 n

b
m

   
Item Description

 Camera menu Displays the camera settings menu.

b
Use this to adjust the direction of the camera or click the crosshair in the center to use it as an
Direction Adjustment
OK button.

c Digital zoom Adjust digital zooming to make an image larger or smaller.

 Sound You can set the camera audio torque and mute.

 Volume control Change the PC volume between 0 and 100.


Sets the preset position for camera framing and moves to designated preset position when
Preset
selecting a desired preset.

English _61
live viewer
Item Description To set a preset

 Swing Moves between the preset start point and end point. 1. Click < > button to display "Preset" window.
2. Click on < > to select the preset order.
 Group Moves in the path specified by combining the preset. 3. Enter the name of preset.

 Trace Moves camera's framing in the predefined path. 4. Use direction keys to adjust the direction which camera
aims at.

Tour Moves in the path specified by combining multiple groups. 5. Click the < > button.


Focus Adjusts the focus of the camera. To activate the preset

Zoom Zooms in/out the image by controling camera's zoom. 1. Click < > button to display "Preset" window.
2. Select a desired preset to activate from the list.
m Sensitivity Adjust the sensitivity of your camera operation. The camera's framing moves to the preset position.

n Digital Zoom Off Returns to the original size from the zoomed state.

Fisheye D-PTZ Provides the digital PTZ function for the distortion corrected screen.

Simple focus Automatically adjusts the camera focus.

To activate digital zoom


1. Press the < > button and the screen will be zoomed in
To activate Swing(Auto-pan), Group(Scan), Trace(Pattern) and Tour
by 50% per click. You can activate listed functions in the same manner as using a preset. For more information, refer to
2. Press the < > button and the screen will be zoomed corresponding user manul of applicable camera.
out by 50% per click.
` Only selective functions of the camera can be supported, depending on camera.
` You can zoom in or out by 10% with the mouse wheel. M
3. Click the < > button and the screen returns to 100%
size.
To use the Digital PTZ (D-PTZ) function
` Digital zoom function is only available in the single model.
M 1. Register a camera that supports the D-PTZ profile.
- In cameras that support the D-PTZ profile, you can use the D-PTZ function.
To use the digital PTZ function on a distortion corrected screen 2. Both cameras that support general PTZ and cameras that support D-PTZ can control the live image using
some of the <PTZ control> function menus.
1. Click the icon on the distortion corrected screen. ` For more information about the supported functions, please refer to the camera manual.
2. Mouse over the screen and drag to control.

62_ live viewer


search viewer
SEARCH VIEWER Item Description

You can search and play the video record saved in NVR by accessing NVR remotely. Sound Sets the sound connected to each channel to either ON/OFF.

Search Viewer Screen Capture Saves current video for selected channel in the designated path.

 Print Prints current video image for selected channel through the assigned printer.

● SEARCH VIEWER
Section backup Backup the video for the selected section.
b
Rotate Video Rotates the screen of a selected channel by 90 degrees.


c Keep ch. scr ratio Changes screen ratio of the selected channel.

 Keep full scr ratio Changes screen ratio for all channels.

 Magnify/Shrink Magnify or shrink the current video for the selected channel.

 OSD Displays the channel information.

Full screen Show the four way split screen in the full screen.
Item Description
 Sound control Adjust the audio for the video searched.
 Menu Selection Switches to the corresponding menu screen by clicking each menu.


Runs the fisheye settings for the selected channel.
Fisheye
(Configures the mounting mode and the view mode to correct the screen distortion.)
b
Displays the video-recorded date in blue and today in red. Click the date in blue color to display
Calendar
the recorded video information in timeline.


Displays the corresponding color depending on recorded data type if you place your mouse
Recording Color
c Channel selection Displays the search channels. cursor on that area.

 Search Search for the user designated channel for the selected date.
Display Pane Plays corresponding data on the screen if you select a search result.

 Text Search Searches data that was entered into POS systems connected to NVR.
Time Search
 Channel displays Display the selected channel number.
You can search recorded data by setting date and time.

To search by date
You can select the search date by using calendar.
1. Click on < , > to select the year/month for your search.
If a date has data associated with it, it is displayed in blue. The current date is displayed as a blue box.
2. Click the date to search in calendar.
The first image of searched video data on the date is displayed on screen and the data is displayed in the
timeline.
3. To search video data on today, click <Today>.
Today's date is selected.

English _63
search viewer
Color indications depending on current recording status To back up the search results

Displays the corresponding color according to the recorded data type. You can back up the search results in the list.
1. Click the [ ] button.
2. From the search results, select the check box of the item
you wish to back up.
• Format : Select the format of the file to back up.
` If 2 or more kinds of recording type are mixed for the same timeline, only the recording type with higher priority is displayed. - AVI : Codec information provided from the NVR is saved
M (Priority: Standard > Motion > Schedule > Sensor > Camera Event > Audio Detection > DST) together and can be played in a separate viewer (Windows
Media Player, etc.) on the PC.
- SEC : Proprietary file format, which can be played on the
To adjust timeline PC immediately as it is saved with a dedicated viewer.
If searched data are overlapping, you can select a desired data, move its playback time point, and zoom in/out ` When you select the SEC format, you can select or deselect
the timeline. "Password" and "Text data included".
• Path : displays the location of the folder in which the section backup file is to be saved.
3. After completing the backup settings, click the <Backup> button.
` If you press the <Stop> button during the backup process, the backup will be suspended.

To run the section backup function


1. Select the number of data to search if data is overlapping. You can select and back up a desired section in the timeline or list of video(s) being played.
It appears only when data are overlapped and assigns <0> to the most recent data. 1. Click the [ ] button.
2. Click your desired time point to play on the timeline. 2. On the timeline of a video being played, select the start point
The playback start point is moved. and the end point of the section to back up.
3. Click <+> / <-> to zoom in/out the zoom factor to display time. Section backup settings screen will open.
4. When magnified, if you want to view the pre/post timeline, click on the timeline and drag it in the direction • Channel : Displays the channel for the section backup.
you want to move it. • Backup section : Displays the <Start time> and the <End
time> of a section to back up.
If you want to check the recording list • Format : Selects the format of a section to back up.
The results for each recording section will be displayed. - AVI : Codec information provided from the NVR is saved together and can be played on a separate viewer
(Windows Media Player, etc..) on the PC.
- SEC : Proprietary file format, which can be played on the PC immediately as it is saved with a dedicated
viewer.
` When you select the SEC format, you can select or deselect "Password" and "Text data included".
• File name : Sets the name of a section backup file.
• Path : displays the location of the folder in which the section backup file is to be saved.
3. After completing the section backup settings, click the <Backup> button.
` If you press the <Stop> button during the section backup process, the backup will be suspended.

64_ search viewer


Text Search Names and Functions of Play Buttons
You can search data that was entered into POS systems connected to NVR.  b c      

If you want to search by a text


1. Select a date and time to search.

● SEARCH VIEWER
2. Set event keywords and search conditions.
- Search Condition : Enter a text to search.
- Event Keyword : Searches based on the condition set in Item Description
"Device > Text > Event settings". (Page 40)
- <Case Sensitive> : If checked, search terms are case-  Back Returns to the previous event.
sensitive.

b
- <Whole Word> : If checked, only results that exactly Used to rewind a video.
Rewind
match the input search terms are returned. (Supports x1, x2, x4, x8, x16, x32, x64, x1, x2 and x4 speed)
3. Click the <Search> button.
c
Used to rewind the video at a slow speed.
` Refer to <Text Search> for the detailed text search method. (Page 52) Slow Rewind
(supports x1/2, x1/4, x1/8, x1/2 and x1/4 speed)

 Previous frame Move to the frame in reverse direction.

 Play/Pause Video is played and paused.

 Stop Terminates the video play.

 Next frame Move to the frame in the forward direction.

If you want to restore text search



Used to play the video forward at a slow speed.
Slow Play
(supports x1/2, x1/4, x1/8, x1/2 and x1/4 speed)
When you enter search conditions and replay the search result
with ON/OFF button in the upper right hand, it is possible to

Used to play a video forwards.
query text data. Slow Forward
(Supports x1, x2, x4, x8, x16, x32, x64, x1, x2 speed)

Move forward Proceeds to the next event.

English _65
setup viewer
SETUP VIEWER System
You can configure the NVR settings remotely on the network. You can configure the various settings of the NVR system.
To configure the NVR settings, click <Setup>.
Date/Time/Language
Settings Screen For more information, refer to "Date/Time/Language" in the "System" menu. (Page 26)
Date/Time

Set the date and time.

b Time Synchronization Setup


c Set the time synchronization.
DST (Daylight Saving Time)
During the summer, Daylight Saving Time (DST) advances
clocks one hour forwards from the standard local time zone.

Language
Select a preferred language for the NVR.
b
Holiday
A user can select specific dates as holidays according to their own preferences.

Item Description

 Menu Selection Click each menu to switch into corresponding menu screen.

b Parent Menu Configure the settings or select a parent item to change the existing settings.

c Sub-Menu Among the sub-menus of selected parent menu, select a desired item to set.

 Detailed Menu Click desired item's input field to change and enter a desired value.

 OK Apply the modified settings.

66_ setup viewer


User System Management
For more information, refer to "User" in the "System Setup" menu. (Page 27) For more information, refer to "System Management" in the "System" menu. (Page 29)
Administrator System Information
You can change the admin ID or the password. You can see information of the current system.
 ID allows alphanumeric characters only. Check the model name, software version, MAC address.
You can search for a file from the storage device connected to
` If the admin ID is not used for access, you cannot change the ID.

● SETUP VIEWER
the PC to perform an upgrade.
` If the ID being used is changed, you will be automatically logged out.

User
You can add, change or remove a user or users. Settings
Using a storage device, you can apply the current configuration
of NVR to another NVR.
Press the Initialize button to return the network settings to their
factory default state. Items in the <Not Included> category are
excluded from the initialization.

Permission Setup
You can set the user permission.
Log information
System log
Data recorded in the system log displays various system-related
logs/date/time such as system starts, system ending and menu
setting changes.

English _67
setup viewer
Event log Camera Setup
The event log lists recorded events, such as sensor events, You can change the settings of a connected network camera.
camera events, or video losses.  When you click the [Camera website] button, a new camera web
browser window is opened.
- It supports the version specified below or later for each Q/P/X series
camera.
(QND-7010R series: 1.04, QND-7080R series: 1.02, QND-6010R
series: 1.02, QND-6070R series: 1.01, P series: 1.01)
- It supports only when the camera is connected to IPv4 and is not set
to HTTPS.
- When you are connecting to the camera web page on a closed network, a camera that does not support the universal web will
not be able to output an image.
- When trying to connect, if the plugin does not get installed, try again after setting the compatibility view from the web page of
Backup log
the NVR web viewer.
You can inquire about a user who performed a backup,
execution time, details (backup time, channel, backup device, Camera Password
backup file type).
You can change the passwords of all registered cameras at
once.

Live Setup
Device You can change the life transfer settings of the network camera.

You can check a list of devices that are connected to the NVR and configure the necessary settings.
Click <Device> in the menu screen.
For more information, refer to "Setting the Device". (Page 31)

Camera
Cam Registration
You can add a network camera(s).

68_ setup viewer


Channel Setup Monitor
You can configure the video settings for each channel.
Monitor
You can configure the monitoring screen settings and set the
output system.

` If the video is not played properly, refer to the troubleshooting


M

● SETUP VIEWER
section later in this manual. (Page 82)
` The Monitor Setup settings control the monitor connected to the
NVR.

Storage Device
You can check and change the settings related to the data storage device. Text
Device/Format
Device
You can check a storage device, amount of use, type of use
Relevant values of a device connected to NVR can be set.
and status of storage device.
• ARB : Video that was not recorded due to disconnection from
the camera can be backed up after the connection with the
camera is re-established.
Press the button and an <Auto Recovery Backup> window
is opened.
For more information about settings, please refer to "Device/
Format". (Page 37)

HDD Alarm
You can set the alarm output port and the duration in case an Event
error occurs. It is possible to set total amount conditions and keywords to
display events of a text device.

English _69
setup viewer
Record Camera
You can set the recording profile for a network camera.
For more information, refer to "Setting the Recording". (Page 40)

Recording Schedule
If you set a recording schedule for a specific date and time, the
recording will start at that specific time.

Record Option
You can set the Disk End Mode.
` You can set the recording duration separately for each channel.

Record Setup
NVR
Select a type of the normal/event recording frame rate for each
channel.

70_ setup viewer


Event Alarm Out Schedule
For more information, refer to "Setting the Event". (Page 42) You can schedule the alarm output according to the day of the
week and the time.
Sensor Detection The default setting is Event Sync, which activates the alarm only
if an event occurs.
NVR / Camera

● SETUP VIEWER
You can set the sensor operation mode and the synchronized
camera as well as the alarm output type and the duration.
` If the connected network camera that has configured the alarm in/out
settings triggers an alarm, NVR will perform the alarm out.

Network
For more information, refer to "Network Configuration". (Page 44)

Interface
Camera Event
A remote user can access the NVR via the network to check the current mode and the IP address.
You can set NVR and camera event mode, alarm output type
and alarm time. Network
Specify the network connection path.

Video Loss Detection Port

You can set to trigger the alarm if a video loss occurs. You can configure the protocol related settings.

English _71
setup viewer
DDNS 802.1x
Network 1/2 When connecting to a network, you can select whether to use
the 802.1x protocol and install corresponding certificate.
You can check the DDNS settings.

Live Streaming
IP Filtering
You can set the video profile transmitted to the network.
You can prepare the list of IP address to allow or block
accesses to a specific IP address.

E-mail
SSL You can specify the SMTP server that sends a mail if an event occurs and set the recipient group and users.
You can select a security connection system or install public SMTP
certificates.
You can set the server that sends mails and specify if you use
` While using HTTPS, if you want to switch to HTTP, then abnormal the authentication process.
M operation can take place as the browser contains the setting
values. You need to change the URL to HTTP and reconnect or
initialize the cookie setting of the browser.

72_ setup viewer


Event DHCP Server
You can set the event interval and specify which events the
server sends mails for. Network
You can set the internal DHCP server and assign an IP address
to the network camera.

● SETUP VIEWER
Recipient
You can set groups and recipients to receive emails.
Check IP
You can check the IP and MAC currently used through the
DHCP server, and the connected network port.

SNMP
Using the SNMP protocol, the system or network administrator
can remotely monitoring the network devices and sets the P2P
environment.
You can check the Enable P2P check box if you want to use
P2P service.
For using P2P service, you have to scan QR Code on screen.

English _73
setup viewer
Using the setting icons • : You can check the recording status and the status of
camera connected.
- Live : Select <Live> to check the status of camera
connected to each channel and the transmission
information.
• : If the button is selected, you can turn on/off the function
to query text devices and data that are located in a separate - Recording : Select <Record> to check the following for
area. each channel : profile, recording type, inputs / recording
transmission rate, settings / inputs / amount of recorded
• : Display the ID of user connected.
data.

- PoE : Select <PoE> to check the consumption by PoE


connected to each channel.
` Click on < > to move to Device > Camera >
Camera Registration.
For more on camera registration, refer to "To register a camera".
(Page 31)

• : You can register a network camera for each channel


and easily set the resolution and the number of shots in case
of event occurrence or manaual recording.
` For more on how to register a camera, refer to "To register a camera".
•< > : You will be immediately directed to the homepage of Hanwha Techwin.
(Page 31)
` If the failover mode is in a standby state, <Quick Setup> item is
hidden.

• : You can manually enter the desired backup channel


and time/date to backup the recorded video.
` You can select whether or not to "Text data included" for SEC format.

74_ setup viewer


backup viewer
SEC BACKUP VIEWER  b c      

You can play a file that is backed up in the format of SEC.


Backup in SEC format produces backup data file, library file and self-executable viewer file.
If you run the backup file viewer, the backup data file will be played. NVR_CAM 01 2016-01-01 16:17:49
VIDEO:H264(2048x1536)/AUDIO:NONE

Recommended System Requirements

● BACKUP VIEWER
PCs with a lower specification than the recommended below may not fully support forward/backward and high-
speed playback.
PC specifications
• Minimum requirements
- CPU : Intel Core 2 Quad 2.5GHz
- RAM : 2GB or Higher
- HDD : 200GB or Higher
- VGA memory : 512MB or Higher
- Display resolution : 1280*1024
• Recommended
- CPU : Intel i7(3.5GHz) or Higher
- RAM : 4GB or Higher
- HDD : 500GB or Higher
- GPU : GTX940 or Higher
- VGA memory : 2GB or Higher
- Display resolution : 1920x1080 or Higher
• OS m

- Windows 7, 8.1, 10, Mac OS X (10.9 or Higher)
• Browser Item Description
1) Non-Plugin Webviewer
Selects screen ratio to display.
- Google Chrome 47, MS Edge 20
 Split screen
The screen is changed to a split screen.
2) Plugin Webviewer
- MS IE 11, Mozilla Firefox 43, Apple Safari 9 (Mac OS X Only)
If < > is pushed, it is possible to change to a fish eye installation type. It is
possible to select WALL/GROUND/CEILING mode according to the installation
b Fish eye view
mode
place.

The fish eye view mode on the current screen can be changed independently
on each split.

Enlarge the image by up to 100 times as big as the current one.


Press the Zoom In ( ) button the enlarge the image; press the Zoom Out
( ) button to shrink the image.
You can also use the slide bar ( ) in the pop-up window to zoom in/out.
Press ( ) on a size-changed video to restore the default zoom factor
c Digital Zoom (100%).
If you enlarge the image by more than 200%, the enlarged area will be
marked on the digital zooming screen. Click on the marked area and move it
to a desired position.
The digital zooming is applied to all backup viewer. When the digital zooming
is canceled, the video size will restore the default rate of 100%.

English _75
backup viewer
Item Description

Saves the current video's image as in an image file. Supports JPEG file format.
 Screen Printout
Prints out the current screen. You should have installed the appropriate printer
driver before you can print out the screen.

A toggle button. Each time you press this button, the audio output will toggle
/
between activated and deactivated.
 Audio
You can adjust the volume level from 0 to 100.

 Watermark / Press the button to enable file tampering detection, to detect data file forging.

 Deinterlace You can enable the De-interlace function.

Check the OSD checkbox to display the OSD information on the backup playback

 Show OSD
screen.
Information such as backup date, day of the week, time, model name, and
channel number will be displayed on the screen.

Maintains the aspect ratio of the playback screen.


 Maintain aspect
ratio/Full screen
Plays the video on a full screen.

Collapses the time range that is displayed on the range bar of the storage time.
You can collapse the range bar until the overall range is shortened to 24 hours.
Enlarge /
Reduce Timeline
Enlarges the time range that is displayed on the range bar of the storage time.
You can enlarge the range bar until the overall range is extended to 1 minute.


Restore Timeline Restores the timeline to the default.

Display of storage time range


Displays the time range of a stored video file.
You can move the gridline of the range bar to select a time point to play.

m Playback Control You can adjust the video playback of the timeline.

76_ backup viewer


appendix
PRODUCT SPECIFICATION Details
Item
Details XRN-410S XRN-810S
Item
XRN-410S XRN-810S Date & Time(Calendar)/Event Log list/Text Search(POS, ANPR), ARB
Mode
Search, Smart search (Virtual Line w/ direction, Enter/Exit)
Display

● APPENDIX
Simultaneous playback Max. 4CH (Local, Network) Max. 8CH (Local, Network)
Search & Play
Inputs Max. 4CH Max. 8CH
Resolution CIF ~ 8MP
Network Camera Resolution CIF ~ 8MP
Playback Control Fast/Slow Forward/Backward, Move one step up/down
Protocols Samsung, ONVIF
0TB ~ 6TB (dependent on region)
Local Display 1x HDMI(HDMI 1.4) / 1x VGA Built-In
- Seagate : ~ 4TB
Storage
[Local Monitor] 1 / 2V / 3V / 4 / [Local Monitor] 1 / 2V / 3V / 4 / Internal HDD 1 (Max. 6TB) 2 (Max. 12TB)
Multi-Channel Display Auto Sequence 6 / 8 / Auto Sequence
[Web] 1 / 4 / Auto Sequence [Web] 1 / 4 / 8 / Auto Sequence
Live File backup BU/Exe(USB), JPG/AVI(Web, CMS)
[Local Monitor] Backup
8MP(60fps) Multi channel(Upto 4CH) Play, Multi channel(Upto 8CH) Play,
Performance Function
5MP(90fps), 3MP(120fps), 2MP(240fps), 720p(240fps), D1(240fps) Date-Time/Title display Date-Time/Title display
- But for Mjpeg, up to 2MP is allowed
Sensor I/O 4/2 (NO 1EA, NO/NC 1EA) 4/3 (NO 2EA, NO/NC 1EA)
Performance
Input 4CH (network) 8CH (network)
Operating System Embedded Linux
Audio Compression G.711, G.726, AAC(16/48KHz)
Compression H.265, H.264, MJPEG (It can decode up to 2M)
Audio Communication 2-Way
Recording Bandwidth Max. 50Mbps Max. 100Mbps
Network
Resolution CIF ~ 8MP
TCP/IP, UDP/IP, RTP (UDP), RTP (TCP), RTSP, NTP, HTTP, DHCP
Record Type Manual, Schedule(Continuous/Event), Event (Pre/Post) Protocol (Server, Client), PPPoE, SMTP, ICMP, IGMP, ARP, DNS, DDNS, uPnP,
HTTPS, SNMP, ONVIF (Profile-S), SUNAPI(Server, Client)
- Alarm Input(4)
Event Trigger - Video Loss
DDNS Hanwha Security DDNS
- Camera event (Sensor, MD, Video analytics, Defocus)

Event Action e-Mail, PTZ Preset, Alarm Out, Buzzer, Monitor Out Transmission Bandwidth 64Mbps 128Mbps

Playback Bandwidth 32Mbps (4CH simultaneously) 32Mbps (8CH simultaneously) Max Remote Users Search(3) / Live unicast(10) / Multicast(20)
Search & Play
Performance Max. 3 Users (Local 1, Remote 3) IP Version IPv4/v6

Security User access Log, IP Filtering, 802.1x, Encryption

English _77
appendix
Details Details
Item Item
XRN-410S XRN-810S XRN-410S XRN-810S

English, French, German, Italian, Spanish, Russian, Turkish, Polish, Live(4ch) : Multi-Profile Support Live(8ch) : Multi-Profile Support
Dutch, Swedish, Czech, Portuguese, Danish, Rumanian, Serbian, Smart phone Control Playback(1ch) Playback(1ch)
Language
Croatian, Hungarian, Greek, Norwegian, Finnish, Korean, Chinese, Event push Event push
Japanese, Thai
System Control Mouse, Web, IR Remocon
OS Windows 7, 8, 10, Mac OS X 10.9. 10.10. 10.11
Indicator/Interface
Plug-in free web viewer
Supported Browser: Google Chrome 47, MS Edge 20 LED (Status indicator) : 6EA
Web Browser Plug-in Webviewer Power Status LED 1EA
LED (Status indicator) : 3EA
Supported MS Explore 11, Mozilla Firefox 43, Apple Safari 9 * Mac HDD Action LED 1EA
Power Status LED 1EA
OS X only Front Indicator Alarm Status LED 1EA
Lan Status LED 1EA
Record Status LED 1EA
Record Status LED 1EA
Type SSM, Webviewer, SmartViewer, Wisenet Mobile Network Action LED 1EA
Viewer Software Backup LED 1EA
CMS Support SDK/CGI (SUNAPI)
VGA 1EA
Functions Connectors
1EA
HDMI
- Support upto 4K (3840 x 2160), 30Hz
Register PnP, Manual
Audio Out(1EA, RCA, Line)
IP address, Add profile edit, Bitrate, Compression, GOP, Quality,
Camera Setup Camera MD setup
Setup Items Camera video setup (Simple focus, Brightness/Contrast, Flip/Mirror, ` 4EA (PoE/PoE+, 100Mbps) ` 8EA (PoE/PoE+, 100Mbps)
IRIS, WDR, D&N, SSNR, Shutter, SSDR, DIS), Fisheye Dewarping(web), Ethernet ` 1EA (WAN, 1Gbps) ` 1EA (WAN, 1Gbps)
Hallway View Setup, Camera Web - WAN : Uplink to CMS - WAN : Uplink to CMS

1) Monitor PoE Power consumption In(4EA, Terminal Block) In(4EA, Terminal Block)
Alarm
Camera Control PoE 2) On/Off Control for each PoE camera Out(2EA, Terminal Block) Out(3EA, Terminal Block)
3) Remote Reset for each PoE camera
Connectors
USB 2EA(Front 1, Rear 1) 3EA(Front 2, Rear 1)
Setup Wizard(Date/Time, Network, Auto Camera Configuration)
Easy Configuration
P2P (QR Code) Storage -

Redundancy ARB Yes Serial -

PTZ Control Via GUI, Webviewer, 255 preset Reset Switch (1EA)

Support Model Android, iOS Power Cord Included


Smart phone
Protocol Support RTP, RTSP, HTTP, CGI (SUNAPI) System

Log Log List Max. 20000 (System Log, Event Log each)

78_ appendix
Details PRODUCT OVERVIEW
Item
XRN-410S XRN-810S • XRN-410S
unit : mm (inches)
Environmental

Operating Temperature / Humidity +0°C to +40°C (+32°F to +104°F)

● APPENDIX
Humidity 20% ~ 85% RH

Electrical

Power Input 54V DC / 1.67A 100 to 240 VAC ±10%

MAX. 13W (44BTU, 2TB HDD x MAX. 19W (64BTU, 2TB HDD x
Power Consumption
1ea) 1ea)

PoE Budget Max. 50W Max. 100W

Mechanical

Color / Material Black / Metal

W300 x H47 x D208.7mm W370 x H44 x D320mm


Dimension (WxHxD)
(11.81”X1.85”X8.22”) (1U) (14.57”X1.73”X12.6”) (1U)

Weight 1.694Kg (2T HDD) 3.356kg (2T HDD)

English _79
appendix
• XRN-810S DEFAULT SETTING
unit : mm (inches)
To reset the system, move to "System Management > Settings > Load Factory Default" and press the
<Initialization> button.
This returns the factory default settings.
` When you initialize with the <Authority Management Settings> included, you are required to reboot the camera and reset the
M password.
` The default settings are based on XRN-810S.
` The initial administrator ID is "admin" and the password should be set when logging in for the first time.
` Please change your password every three months to safely protect personal information and to prevent the damage of the information theft.
Please, take note that it's a user's responsibility for the security and any other problems caused by mismanaging a password.

Category Details Factory Default


Date YYYY-MM-DD
Time 24 hours
Time Zone GMT
Date/Time/Language Date/Time/Language
Time Sync. OFF
DST OFF
Language English
Admin ID admin
Backup/Record/Record
System Restricted Access Stop/Search/PTZ/Remote
User Alarm Out/Shutdown
Permission Setup Restriction on Network Access None
Auto Log out 3 Min
Manual Input of ID OFF
System Management System Information Device Name NVR
System Log Type View all
Log Information Event Log Type View all
Backup Log OFF
Camera Register OFF
Set Camera OFF
Camera Password OFF
Camera Live Setup OFF
Video ON
Channel Setup Audio OFF
Device
Camera Name CAM 01 ~ CAM 08
Device HDD
Usage
Storage Device Device/Format Status
Temperature -
Time -

80_ appendix
Category Details Factory Default Category Details Factory Default
Check Alarm Output Port BEEP Camera Event OFF
Duration Continuous MD OFF
Storage Device HDD Alarm
Replace Alarm Output Port BEEP Smart Search OFF
Camera Event Camera
Duration Continuous Cam Camera No.
Remote Control ON Alarm None
Remote Device Event

● APPENDIX
ID 00 Alarm Duration 10 sec
Event Display OFF Video loss status OFF
Display All Video loss detection Alarm Out None
Device
Monitor Monitor Sequence switching time 5 sec Alarm Duration 10 sec
Video Output VGA(1280x1024) Alarm Out Schedule Alarm Out1 Event Sync
Display Position Setup 30 IP Type Static IP
Device TEXT 01~08 PnP mode :
Use Not Used 192.168.231.200
Network 1(Camera)
Device Manual mode :
Text Port 7001~7008 192.168.1.200
Encoding type US-ASCll Network 2(All) 192.168.2.200
Event Total amount 0 Network
Subnet Mask 255.255.255.0
Recording Schedule CH1~CH8 Both(Cont&Evnt) PnP mode :
Standard Full 192.168.231.1
Gateway
Event Full Manual mode :
Interface 192.168.1.1
Record Setup Pre Event OFF
DNS 168.126.63.1
Record POST Event 1 min
Protocol Type TCP
Audio OFF Network
Device Type 554
Overwrite
Disk End Mode UDP Port 8000~8159
Record Option Disk End Beep OFF
Multicast IP Address 224.126.63.1
Auto Delete OFF Port
Multicast TTL 5
Sensor Operation OFF
HTTP Port 80
Cam Camera No.
NVR Send SSL OFF
Alarm Out None
Backup Bandwidth Low
Duration 10 sec
Event Sensor Detection DDNS Network1/2 DDNS Site OFF
Sensor Operation OFF
IP Filtering Filtering Type Deny
Cam Camera No.
Camera HTTP (Non-secured
Alarm Out None SSL Secured Connection System
connection)
Duration 10 sec 802.1x Network Enable IEEE 802.1x OFF

English _81
appendix
Category Details Factory Default TROUBLESHOOTING
Live Streaming OFF
Port 25 Problem Action
SMTP Use Authentication OFF
Live video will be slow or cut off. y The frame number set for multiple data transmission set in camera or
Secure Transfer Never network environment could differ from the actual rate of transmission.
E-Mail Event Interval 5 min Right click with the mouse button and select <Channel Information> to
Event check the number of incoming frames for each channel and the actual
Use Event Transfer OFF
number of framed played.
Group Name OFF Basically, when you register a camera, the Live4NVR profile is created and the
Recipient
Permission OFF rate is set to H.264.800*600fps.
Enable SNMP v1 OFF If necessary, go to <Menu>  <Device>  <Camera>  <Camera
Setting> and change the number of frames.
Enable SNMP v2 OFF
SNMP y If you keep seeing video slow down or cut off, then check the network
Enable SNMP v3 OFF environment or camera condition.
Enable SNMP Traps OFF
The system does not turn on and the indicator on the y Check if the power supply system is properly connected.
Network IP Address 192.168.1.200 front panel does not work at all. y Check the system for the input voltage from the power source.
Subnet Mask 255.255.255.0 y If the problem persists even after you have taken the above actions, check
PnP mode : the power supplier and replace it with a new one if neccessary.
192.168.231.1 y Check inside if the cables are properly connected. (SMPS, FRONT)
Network 1(camera) ~ 192.168.231.254
IP Range
Manual mode : Some channels display just a black screen even if y Check if the camera is properly supplied with power.
192.168.1.1 they receive video sources. y Check the video output connecting the camera's webviewer.
DHCP Server ~ 192.168.1.254 y Check if the network port is properly connected and the network setting is
set correctly.
IP Lease time 86400 y Change the hub supporting Gigabit, it may solves.
IP Address 192.168.2.200
The screen displays the logo image repeatedly. y This may occur from a problem with the main board, or the related software is
Subnet Mask 255.255.255.0
corrupt.
Network 2(All) 192.168.2.1 ~ Contact the nearest service center for more information.
IP Range
192.168.2.254
IP Lease time 86400 The Channel button does not work on the Live y The Channel button does not work if the current screen is in the event
screen. monitoring mode.
P2P Enable P2P OFF
The cursor will not move to the Start button when I y Check if the channel and the date that you want to play are marked with the V
start the calendar search. symbol.
Both channel and date should be checked before you can start playing with
the Start button.

No video is played on the connected monitor. y Check if the necessary cables are connected to the monitor properly.
y Some monitors do not support the NVR output (HDMI or VGA).
(NVR output resolution : VGA : 1024*768, 1280*720, 1280*1024,
1920*1080, HDMI : 720P, 1080P, 1440P, 2160P) Check the monitor
resolution
y If you operate at 60Hz with 4K resolution, the screen may not be able to
display.
Please check whether your TV supports 30Hz.

82_ appendix
Problem Action Problem Action
No response controlling PTZ in the live viewer. y Check the registered Camera if it support PTZ function. I forgot the password. y Contact the NVR administrator for help.

The camera is not connected or the PC fails to y Check if the network cable is connected properly. Backup data is just not played by the PC or NVR. y When you are backing up data, you have choices about the player either: PC
connect to the product. y Ensure that you have set Network – Connection Mode. or NVR. Make your selection before proceeding.
y Check the IP setting of the PC or camera. y If you are using the PC to play the data, the format of the backup file should
y Try the Ping Test. be either SEC.
y If you are using the NVR for this purpose, formatting backup files should be

● APPENDIX
y Check if there is a different device near the product uses the same IP. done by the NVR.
I registered a camera, but the web viewer does not y After registering a camera, a user need to edit/save the desired layout, before Recording does not work. y If your player does not display a Live image at all, that indicates recording
show live video. the screen split mode and live screen fit for the setting appears. does not work so first check if you see an image on the screen.
y Recording does not work if the recording settings are not properly configured
In the web viewer, the screen does not switch y You need to select the desired layout for sequence operation, in the automatic
Scheduled Record: Specify a desired time in Menu – Record – Recording
automatically. switching menu.
Schedule. Recording will start at the specified time.
The Live screen is too bright or too dark. y Check the video settings of the registered camera. - <Continuous> Record: Recording will proceed in any conditions at the
specified time.
A message of "Need to reset date/time." Is displayed y This message is displayed if there occurs a problem with the time setting of - <Event> Record: When an event occurs, recording will perform only if
on the screen. the internal clock or an error in the clock itself. the event is of alarm, motion detection and video loss.
Contact the retailer or the service center for more information. If there is no event found, recording will not perform.
- <Continuous / Event> Record: If there is no event found, Continuous
The time bar is not displayed in Search mode. y The timeline can switch between normal and extension mode. recording will perform. Whereas, if an event occurs, Event recording will
In extension mode, the time bar may not be displayed in the current timeline. perform.
Switch to normal mode or use the left or right button to navigate through the
time bar. The image quality of the recording data is not good. y Increase the resolution and quality level in Menu – Record – Quality /
Resolution.
The "NO HDD" icon and an error message are y Check the HDD for connection. If the problem persists in a normal condition, 1) Resolution: Select a bigger size when specifying the recording size.
displayed. contact the nearest service center to have the HDD checked by the service The recording image in the CIF format shows a deteriorated quality as
personnel. it is enlarged from a small-sized image.
2) Record Quality: Specify a bigger level for the recording quality.
I have installed an additional HDD on the NVR but it y See the compatibilty list to check if the additional HDD is supported by the y If you increase the resolution and the recording quality, the data size
does not recognize the HDD. NVR. For the compatibility list, contact the retailer where you purchased the increases accordingly. So the HDD will be filled faster. Overwriting will
NVR. overwrite the existing data so recording will proceed at a shorter interval.

I have connected an external storage device (USB y See the compatibility list of external storage devices to check if the connected Frame rate of the actual recording does not match y If multiple profiles were applied to one camera for video transmission, the
Memory, USB HDD) to the NVR but the NVR seems device is supported by the NVR. For the compatibility list, contact the retailer that of configured to the camera. actual video stream can be serviced by the camera at a lower frame rate than
not to recognize it. where you purchased the NVR. specified.
Configure your camera to use one profile for data streaming as possible.
If I press the ESC key in full screen mode of the For example, if you set the same profile for recording and network profiles,
y Press the ALT+TAB keys to select 'ACTIVE MOVIE' and press the ESC key
WebViewer, the system does not switch to a normal the actual recording is made at the specified frame rate.
again. The system will switch to a normal split mode.
split mode. Still, live video display using split screen mode may apply yet another profile
to camera in accordance with the used screen mode.
I found it difficult to configure the network settings if y For more information, refer to the user manual. Note that allowed limit bitrate for recording / recording settings should be set
using the default search, backup and router settings. y If you want to check the basics of the product for a quick start, refer to the to be bigger values than that of camera's feed.
quick start guide (backup, search).
y If you use the router for network connection, refer to the "Connecting
and Setting the Network" section in this manual.

English _83
appendix
Problem Action
In the recording setting screen, the permitted level y If the input data is greater than the permitted level for each channel, it is
for a specific channel is displayed in orange. displayed in orange. Set the permitted data limit to higher than the amount of
input data.
y If the sum of input data for each channel exceeds the limit, the alarm icon will
be displayed. In this case, the channel exceeding the input limit does not
record the entire frame, but it records the main frame only(one or two per
sec).

In the live screen, the [ ] icon is displayed and y If the sum of input data for each channel exceeds the limit, the alarm icon
the message window saying " recording data load and the pop up window will be displayed. In this case, the channel exceeding
exceeds the limit. Check it in the record setting." the input limit does not record the entire frame, but it records the main frame
pops up. only(one or two per sec).
y Set the permitted data limit to higher than the amount of input data entered
in the record setting menu (page 41).

Recording is not performed in accordance with the y If the recording status displays ‘Exceeds the maximum hard disc
settings. performance’, set the recording size according to the recording performance
specifications.
(Refer to "Record Settings" in the menu settings. (Page 41))

The recording screen will slow down. y Check whether the recording performance specifications match the actual
recording settings.
(Refer to "Record Settings" in the menu settings. (Page 41))
y If the data volume of a video exceeds the playing performance, only the main
frame is played.
(Refer to "Product Specifications" in the appendix. (Page 77))

If recording loss persists continuously y Reset the camera recording profile to let the entire recording bps size fit
the recording performance. (Refer to “Record Settings” in the menu
settings. (Page 41))
` Check the HDD status and determine whether inspection or replacement
is necessary.
(Refer to “Storage Device” in the menu settings. (Page 37))

When plugin does not get installed when trying to y Try again after setting the compatibility view from the web page of the
connect to the camera web page from camera NVR web viewer.
settings in the web viewer

84_ appendix
Open Source License Report on the Product TERMS AND CONDITIONS FOR COPYING,
DISTRIBUTION AND MODIFICATION
c) Accompany it with the information you received as to the offer to
distribute corresponding source code. (This alternative is allowed only
for noncommercial distribution and only if you received the program in
The software included in this product contains copyrighted software that is licensed under the GPL, LGPL, MPL 1.1, BSD 2-Clause License, BSD 0. This License applies to any program or other work which contains a object code or executable form with such an offer, in accord with
3-Clause License, MIT License, libxml2 License, Apache 2.0 License, zlib/libpng License, Boost Software License, Curl License, Microsoft Public notice placed by the copyright holder saying it may be distributed under Subsection b above.)
License, Code Project Open 1.02 License, JPEG License, RSA MD4 or MD5 Message-Digest Algorithm License, PHP License 3.01, OpenSSL the terms of this General Public License. The "Program", below, refers to The source code for a work means the preferred form of the work for
Combined License, PCRE 5 License, NTP License, CodeIgniter License, GLUT for Win32 License, ISC License, Brian Gladman Alternate License. You any such program or work, and a "work based on the Program" means making modifications to it. For an executable work, complete source
may obtain the complete Corresponding Source code from us for a period of three years after our last shipment of this product by sending email to either the Program or any derivative work under copyright law: that is to code means all the source code for all modules it contains, plus any
help.cctv@hanwha.com say, a work containing the Program or a portion of it, either verbatim or associated interface definition files, plus the scripts used to control
with modifications and/or translated into another language. (Hereinafter, compilation and installation of the executable. However, as a special
If you want to obtain the complete Corresponding Source code in the physical medium such as CD-ROM, the cost of physically performing source
translation is included without limitation in the term "modification".) Each exception, the source code distributed need not include anything that is
distribution might be charged.
licensee is addressed as "you". normally distributed (in either source or binary form) with the major
For more details about Open Source, refer to the CD or Hanwha Website. components (compiler, kernel, and so on) of the operating system on
Activities other than copying, distribution and modification are not
• GPL Software: acl-2.2.52, arp-scan-1.9, bash-4.3, bc-1.06, bluez-5.42, bonnie++-1.03e, busybox-1.24.1, coreutils-8.23, curlftpfs-0.9.2, covered by this License; they are outside its scope. The act of running which the executable runs, unless that component itself accompanies
dibbler-1.0.1, dosfstools-3.0.28, dvd+rw-tools-7.1, e2fsprogs-1.42.13, ethtool-3.11, fuse-2.9.7, gdb-7.8.1, grep-2.26, htop-1.0.2, iftop-0.17, the Program is not restricted, and the output from the Program is the executable.
iptables-1.4.21, open-iscsi-2.0-873, libnfnetlink-1.0.1, lrzsz-0.12.20, lsscsi-0.28, LVM2.2.02.98, lzo-2.09, mdadm-3.4,memtester-4.3.0, covered only if its contents constitute a work based on the Program If distribution of executable or object code is made by offering access to
mii-tool-1.9.1.1, msmtp-1.4.21, mtd-utils-1.5.1, net-tools-1.60, nethogs-0.8.0, nmon, nut-2.7.4, parted-3.2, procps-3.2.8, readline-6.2, rsync-3.1.2, (independent of having been made by running the Program). Whether copy from a designated place, then offering equivalent access to copy
smartmontools-6.5, sshpass-1.06, termcap-2.0.8, throttle-1.2, tree-1.7.0, udev-167, usbutils-0.72, util-linux-2.28-rc2, wget-1.18, ireless_tools.29, that is true depends on what the Program does. the source code from the same place counts as distribution of the
wpa_supplicant-0.7.3, xfsprogs-4.7.0 1. You may copy and distribute verbatim copies of the Program's source source code, even though third parties are not compelled to copy the
• LGPL Software: avahi-0.6.32, ffmpeg-2.4.3, glib-2.46.2, libdaemon-0.14, libnl-3.2.25, libusb-0.1.12, libusb-0.1.5, qrencode-3.4.4, wvdial-1.61, code as you receive it, in any medium, provided that you conspicuously source along with the object code.
wvstreams-4.6.1, Live555, qtopia4.7.2 and appropriately publish on each copy an appropriate copyright notice 4. You may not copy, modify, sublicense, or distribute the Program
and disclaimer of warranty; keep intact all the notices that refer to this except as expressly provided under this License. Any attempt otherwise
• MPL 1.1: npapi-sdk
License and to the absence of any warranty; and give any other to copy, modify, sublicense or distribute the Program is void, and will
• BSD 2-Clause License: FreeBSD recipients of the Program a copy of this License along with the Program. automatically terminate your rights under this License. However, parties
• BSD 3-Clause License: miniupnpc-1.5-ppc, net-snmp-5.6.2.1, ppp-2.4.5, jquery.sha256, jsbn, libjpeg-turbo, lighttpd, msinttypes, requires, who have received copies, or rights, from you under this License will not
You may charge a fee for the physical act of transferring a copy, and you
spheral++, sprintf 0.7, System-Verilog-Packet-Library, Text OpenGL Extension Wrangler Library 1.7.0 may at your option offer warranty protection in exchange for a fee. have their licenses terminated so long as such parties remain in full
• MIT License: aptechcmsv2, avropendous, cjson, cJSON-Dave Gamble, dynatree, javascript-ipv6, jqGrid, jQuery UI, jquery-form, jquery- compliance.
2. You may modify your copy or copies of the Program or any portion of
hashchange, jquery-json, jquery-numeric, jquery-throttle-debounce 1.1, JS-Browser-Driver, moon9, noty, Raphael JavaScript Library, wildflower 5. You are not required to accept this License, since you have not signed
it, thus forming a work based on the Program, and copy and distribute
1.3.Beta such modifications or work under the terms of Section 1 above, provided it. However, nothing else grants you permission to modify or distribute
• libxml2 License: libxml2 2.7.7 that you also meet all of these conditions: the Program or its derivative works. These actions are prohibited by law if
• Apache 2.0 License: RLLib a) You must cause the modified files to carry prominent notices stating
you do not accept this License. Therefore, by modifying or distributing
• zlib/libpng Lisence: cximage, HM NIS Edit, Nullsoft Scriptable Install System 2.46, PNG reference library, tinyxml 2.6.2, zlib the Program (or any work based on the Program), you indicate your
that you changed the files and the date of any change.
acceptance of this License to do so, and all its terms and conditions for
• Boost Software License: boost 1.57.0 b) You must cause any work that you distribute or publish, that in copying, distributing or modifying the Program or works based on it.
• Curl License: curl 7.49.1 whole or in part contains or is derived from the Program or any part
6. Each time you redistribute the Program (or any work based on the
• Microsoft Public License: Minima, Text Designer Outline Text Library thereof, to be licensed as a whole at no charge to all third parties
Program), the recipient automatically receives a license from the original
under the terms of this License.
• Code Project Open 1.02 License: CPPPSQLite - C++ Wrapper for SQLite, A reusable, high performance, socket server class - Part3 licensor to copy, distribute or modify the Program subject to these terms
• JPEG License: libjpeg-8b c) If the modified program normally reads commands interactively and conditions. You may not impose any further restrictions on the
when run, you must cause it, when started running for such recipients' exercise of the rights granted herein. You are not responsible
• RSA MD4 or MD5 Message-Digest Algorithm License: JavaScript MD5 1.1, sipxtapi
interactive use in the most ordinary way, to print or display an for enforcing compliance by third parties to this License.
• PHP License 3.01: HPHP-2.1.0, PHP 5.6.14 announcement including an appropriate copyright notice and a notice
7. If, as a consequence of a court judgment or allegation of patent
• OpenSSL Combined License: OpenSSL 1.0.2h that there is no warranty (or else, saying that you provide a warranty)
infringement or for any other reason (not limited to patent issues),
• PCRE 5 License: pcre 8.39 and that users may redistribute the program under these conditions,
conditions are imposed on you (whether by court order, agreement or
and telling the user how to view a copy of this License. (Exception: if
• NTP License: ntp 4.2.8p8 otherwise) that contradict the conditions of this License, they do not
the Program itself is interactive but does not normally print such an
• CodeIgniter License: CodeIgniter announcement, your work based on the Program is not required to
excuse you from the conditions of this License. If you cannot distribute
• GLUT for Win32 License: GLUT for Win32 so as to satisfy simultaneously your obligations under this License and
print an announcement.)
any other pertinent obligations, then as a consequence you may not
• ISC License: dhcp 4.3-2rc2 These requirements apply to the modified work as a whole. If identifiable distribute the Program at all. For example, if a patent license would not
• Brian Gladman Alternate License: AES with the VIA ACE sections of that work are not derived from the Program, and can be permit royalty-free redistribution of the Program by all those who receive
• Acknowledgement: This product includes modified version of ffmpeg, Live555, qtopia4.7.2 and npapi-sdk. reasonably considered independent and separate works in themselves, copies directly or indirectly through you, then the only way you could
then this License, and its terms, do not apply to those sections when satisfy both it and this License would be to refrain entirely from
you distribute them as separate works. But when you distribute the
GNU General Public License (GPL)
distribution of the Program.
To protect your rights, we need to make restrictions that forbid anyone to same sections as part of a whole which is a work based on the Program,
deny you these rights or to ask you to surrender the rights. These If any portion of this section is held invalid or unenforceable under any
the distribution of the whole must be on the terms of this License, whose
Version 2, June 1991 restrictions translate to certain responsibilities for you if you distribute permissions for other licensees extend to the entire whole, and thus to
particular circumstance, the balance of the section is intended to apply
copies of the software, or if you modify it. and the section as a whole is intended to apply in other circumstances.
each and every part regardless of who wrote it.
Copyright (C) 1989, 1991 Free Software Foundation, Inc. For example, if you distribute copies of such a program, whether gratis It is not the purpose of this section to induce you to infringe any patents
Thus, it is not the intent of this section to claim rights or contest your
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA or for a fee, you must give the recipients all the rights that you have. You or other property right claims or to contest validity of any such claims;
rights to work written entirely by you; rather, the intent is to exercise the
must make sure that they, too, receive or can get the source code. And this section has the sole purpose of protecting the integrity of the free
Everyone is permitted to copy and distribute verbatim copies right to control the distribution of derivative or collective works based on
you must show them these terms so they know their rights. software distribution system, which is implemented by public license
of this license document, but changing it is not allowed. the Program.
practices. Many people have made generous contributions to the wide
We protect your rights with two steps: (1) copyright the software, and (2) In addition, mere aggregation of another work not based on the Program range of software distributed through that system in reliance on
offer you this license which gives you legal permission to copy, distribute
Preamble and/or modify the software.
with the Program (or with a work based on the Program) on a volume of consistent application of that system; it is up to the author/donor to
a storage or distribution medium does not bring the other work under the decide if he or she is willing to distribute software through any other
The licenses for most software are designed to take away your freedom Also, for each author's protection and ours, we want to make certain scope of this License. system and a licensee cannot impose that choice.
to share and change it. By contrast, the GNU General Public License is that everyone understands that there is no warranty for this free software. 3. You may copy and distribute the Program (or a work based on it, This section is intended to make thoroughly clear what is believed to be
intended to guarantee your freedom to share and change free software-- If the software is modified by someone else and passed on, we want its under Section 2) in object code or executable form under the terms of a consequence of the rest of this License.
to make sure the software is free for all its users. This General Public recipients to know that what they have is not the original, so that any Sections 1 and 2 above provided that you also do one of the following:
License applies to most of the Free Software Foundation's software and problems introduced by others will not reflect on the original authors' 8. If the distribution and/or use of the Program is restricted in certain
to any other program whose authors commit to using it. (Some other reputations. a) Accompany it with the complete corresponding machine-readable countries either by patents or by copyrighted interfaces, the original
Free Software Foundation software is covered by the GNU Library source code, which must be distributed under the terms of Sections 1 copyright holder who places the Program under this License may add an
Finally, any free program is threatened constantly by software patents. and 2 above on a medium customarily used for software interchange;
General Public License instead.) You can apply it to your programs, too. explicit geographical distribution limitation excluding those countries, so
We wish to avoid the danger that redistributors of a free program will or,
When we speak of free software, we are referring to freedom, not price. that distribution is permitted only in or among countries not thus
individually obtain patent licenses, in effect making the program
Our General Public Licenses are designed to make sure that you have b) Accompany it with a written offer, valid for at least three years, to excluded. In such case, this License incorporates the limitation as if
proprietary. To prevent this, we have made it clear that any patent must
the freedom to distribute copies of free software (and charge for this give any third party, for a charge no more than your cost of physically written in the body of this License.
be licensed for everyone's free use or not licensed at all.
service if you wish), that you receive source code or can get it if you want performing source distribution, a complete machine-readable copy of 9. The Free Software Foundation may publish revised and/or new
The precise terms and conditions for copying, distribution and the corresponding source code, to be distributed under the terms of
it, that you can change the software or use pieces of it in new free versions of the General Public License from time to time. Such new
modification follow. Sections 1 and 2 above on a medium customarily used for software
programs; and that you know you can do these things. versions will be similar in spirit to the present version, but may differ in
interchange; or, detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program The hypothetical commands `show w' and `show c' should show the Finally, every program is threatened constantly by software patents. 2. Basic Permissions.
specifies a version number of this License which applies to it and "any appropriate parts of the General Public License. Of course, the States should not allow patents to restrict development and use of All rights granted under this License are granted for the term of copyright
later version", you have the option of following the terms and conditions commands you use may be called something other than `show w' and software on general-purpose computers, but in those that do, we wish on the Program, and are irrevocable provided the stated conditions are
either of that version or of any later version published by the Free `show c'; they could even be mouse-clicks or menu items--whatever to avoid the special danger that patents applied to a free program could met. This License explicitly affirms your unlimited permission to run the
Software Foundation. If the Program does not specify a version number suits your program. make it effectively proprietary. To prevent this, the GPL assures that unmodified Program. The output from running a covered work is covered
of this License, you may choose any version ever published by the Free You should also get your employer (if you work as a programmer) or your patents cannot be used to render the program non-free. by this License only if the output, given its content, constitutes a covered
Software Foundation. school, if any, to sign a "copyright disclaimer" for the program, if The precise terms and conditions for copying, distribution and work. This License acknowledges your rights of fair use or other
10. If you wish to incorporate parts of the Program into other free necessary. Here is a sample; alter the names: modification follow. equivalent, as provided by copyright law.
programs whose distribution conditions are different, write to the author Yoyodyne, Inc., hereby disclaims all copyright You may make, run and propagate covered works that you do not
to ask for permission. For software which is copyrighted by the Free TERMS AND CONDITIONS convey, without conditions so long as your license otherwise remains in
Software Foundation, write to the Free Software Foundation; we interest in the program `Gnomovision'
force. You may convey covered works to others for the sole purpose of
sometimes make exceptions for this. Our decision will be guided by the (which makes passes at compilers) written 0. Definitions.
having them make modifications exclusively for you, or provide you with
two goals of preserving the free status of all derivatives of our free by James Hacker. “This License” refers to version 3 of the GNU General Public License. facilities for running those works, provided that you comply with the
software and of promoting the sharing and reuse of software generally. terms of this License in conveying all material for which you do not
signature of Ty Coon, 1 April 1989 “Copyright” also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks. control copyright. Those thus making or running the covered works for
NO WARRANTY Ty Coon, President of Vice you must do so exclusively on your behalf, under your direction and
“The Program” refers to any copyrightable work licensed under this control, on terms that prohibit them from making any copies of your
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, This General Public License does not permit incorporating your program
License. Each licensee is addressed as “you”. “Licensees” and copyrighted material outside their relationship with you.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT into proprietary programs. If your program is a subroutine library, you
“recipients” may be individuals or organizations.
PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE may consider it more useful to permit linking proprietary applications with Conveying under any other circumstances is permitted solely under the
the library. If this is what you want to do, use the GNU Lesser General To “modify” a work means to copy from or adapt all or part of the work in conditions stated below. Sublicensing is not allowed; section 10 makes it
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER a fashion requiring copyright permission, other than the making of an
PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF Public License instead of this License. unnecessary.
exact copy. The resulting work is called a “modified version” of the earlier
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND GNU General Public License work or a work “based on” the earlier work.
No covered work shall be deemed part of an effective technological
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO A “covered work” means either the unmodified Program or a work based
Version 3, 29 June 2007 on the Program. measure under any applicable law fulfilling obligations under article 11 of
THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
the WIPO copyright treaty adopted on 20 December 1996, or similar
SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> To “propagate” a work means to do anything with it that, without laws prohibiting or restricting circumvention of such measures.
COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. Everyone is permitted to copy and distribute verbatim copies of this permission, would make you directly or secondarily liable for infringement
under applicable copyright law, except executing it on a computer or When you convey a covered work, you waive any legal power to forbid
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR license document, but changing it is not allowed.
modifying a private copy. Propagation includes copying, distribution (with circumvention of technological measures to the extent such
AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY
circumvention is effected by exercising rights under this License with
OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE Preamble or without modification), making available to the public, and in some
respect to the covered work, and you disclaim any intention to limit
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR countries other activities as well.
The GNU General Public License is a free, copyleft license for software operation or modification of the work as a means of enforcing, against
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR To “convey” a work means any kind of propagation that enables other
and other kinds of works. the work's users, your or third parties' legal rights to forbid circumvention
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR parties to make or receive copies. Mere interaction with a user through a of technological measures.
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO The licenses for most software and other practical works are designed to computer network, with no transfer of a copy, is not conveying.
LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR take away your freedom to share and change the works. By contrast, the 4. Conveying Verbatim Copies.
An interactive user interface displays “Appropriate Legal Notices” to the
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF GNU General Public License is intended to guarantee your freedom to You may convey verbatim copies of the Program's source code as you
extent that it includes a convenient and prominently visible feature that (1)
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN share and change all versions of a program--to make sure it remains free receive it, in any medium, provided that you conspicuously and
displays an appropriate copyright notice, and (2) tells the user that there
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE software for all its users. We, the Free Software Foundation, use the appropriately publish on each copy an appropriate copyright notice;
is no warranty for the work (except to the extent that warranties are
POSSIBILITY OF SUCH DAMAGES. GNU General Public License for most of our software; it applies also to keep intact all notices stating that this License and any non-permissive
provided), that licensees may convey the work under this License, and
any other work released this way by its authors. You can apply it to your how to view a copy of this License. If the interface presents a list of user terms added in accord with section 7 apply to the code; keep intact all
END OF TERMS AND CONDITIONS programs, too. commands or options, such as a menu, a prominent item in the list notices of the absence of any warranty; and give all recipients a copy of
When we speak of free software, we are referring to freedom, not price. meets this criterion. this License along with the Program.
How to Apply These Terms to Your New Programs You may charge any price or no price for each copy that you convey, and
Our General Public Licenses are designed to make sure that you have 1. Source Code.
If you develop a new program, and you want it to be of the greatest the freedom to distribute copies of free software (and charge for them if you may offer support or warranty protection for a fee.
The “source code” for a work means the preferred form of the work for
possible use to the public, the best way to achieve this is to make it free you wish), that you receive source code or can get it if you want it, that 5. Conveying Modified Source Versions.
making modifications to it. “Object code” means any non-source form of
software which everyone can redistribute and change under these terms. you can change the software or use pieces of it in new free programs,
a work. You may convey a work based on the Program, or the modifications to
and that you know you can do these things.
To do so, attach the following notices to the program. It is safest to A “Standard Interface” means an interface that either is an official produce it from the Program, in the form of source code under the terms
attach them to the start of each source file to most effectively convey the To protect your rights, we need to prevent others from denying you these of section 4, provided that you also meet all of these conditions:
standard defined by a recognized standards body, or, in the case of
exclusion of warranty; and each file should have at least the "copyright" rights or asking you to surrender the rights. Therefore, you have certain
interfaces specified for a particular programming language, one that is a) The work must carry prominent notices stating that you modified it,
line and a pointer to where the full notice is found. responsibilities if you distribute copies of the software, or if you modify it:
widely used among developers working in that language. and giving a relevant date.
responsibilities to respect the freedom of others.
one line to give the program's name and an idea of what it does. The “System Libraries” of an executable work include anything, other
For example, if you distribute copies of such a program, whether gratis b) The work must carry prominent notices stating that it is released
Copyright (C) yyyy name of author than the work as a whole, that (a) is included in the normal form of under this License and any conditions added under section 7. This
or for a fee, you must pass on to the recipients the same freedoms that
This program is free software; you can redistribute it and/or packaging a Major Component, but which is not part of that Major requirement modifies the requirement in section 4 to “keep intact all
you received. You must make sure that they, too, receive or can get the
Component, and (b) serves only to enable use of the work with that notices”.
modify it under the terms of the GNU General Public License source code. And you must show them these terms so they know their
Major Component, or to implement a Standard Interface for which an
rights. c) You must license the entire work, as a whole, under this License to
as published by the Free Software Foundation; either version 2 implementation is available to the public in source code form. A “Major
Developers that use the GNU GPL protect your rights with two steps: (1) anyone who comes into possession of a copy. This License will
of the License, or (at your option) any later version. Component”, in this context, means a major essential component
assert copyright on the software, and (2) offer you this License giving you therefore apply, along with any applicable section 7 additional terms,
(kernel, window system, and so on) of the specific operating system (if
This program is distributed in the hope that it will be useful, legal permission to copy, distribute and/or modify it. to the whole of the work, and all its parts, regardless of how they are
any) on which the executable work runs, or a compiler used to produce
packaged. This License gives no permission to license the work in
but WITHOUT ANY WARRANTY; without even the implied warranty of For the developers' and authors' protection, the GPL clearly explains that the work, or an object code interpreter used to run it.
any other way, but it does not invalidate such permission if you have
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See there is no warranty for this free software. For both users' and authors' The “Corresponding Source” for a work in object code form means all separately received it.
the sake, the GPL requires that modified versions be marked as changed, so the source code needed to generate, install, and (for an executable work)
that their problems will not be attributed erroneously to authors of d) If the work has interactive user interfaces, each must display
run the object code and to modify the work, including scripts to control
GNU General Public License for more details. previous versions. Appropriate Legal Notices; however, if the Program has interactive
those activities. However, it does not include the work's System
You should have received a copy of the GNU General Public License interfaces that do not display Appropriate Legal Notices, your work
Some devices are designed to deny users access to install or run Libraries, or general-purpose tools or generally available free programs
need not make them do so.
along with this program; if not, write to the Free Software modified versions of the software inside them, although the manufacturer which are used unmodified in performing those activities but which are
can do so. This is fundamentally incompatible with the aim of protecting not part of the work. For example, Corresponding Source includes A compilation of a covered work with other separate and independent
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, works, which are not by their nature extensions of the covered work, and
users' freedom to change the software. The systematic pattern of such interface definition files associated with source files for the work, and the
USA. which are not combined with it such as to form a larger program, in or on
abuse occurs in the area of products for individuals to use, which is source code for shared libraries and dynamically linked subprograms that
Also add information on how to contact you by electronic and paper mail. precisely where it is most unacceptable. Therefore, we have designed the work is specifically designed to require, such as by intimate data a volume of a storage or distribution medium, is called an “aggregate” if
If the program is interactive, make it output a short notice like this when it this version of the GPL to prohibit the practice for those products. If such communication or control flow between those subprograms and other the compilation and its resulting copyright are not used to limit the
starts in an interactive mode: problems arise substantially in other domains, we stand ready to extend parts of the work. access or legal rights of the compilation's users beyond what the
this provision to those domains in future versions of the GPL, as needed individual works permit. Inclusion of a covered work in an aggregate
Gnomovision version 69, Copyright (C) year name of author The Corresponding Source need not include anything that users can
to protect the freedom of users. does not cause this License to apply to the other parts of the aggregate.
regenerate automatically from other parts of the Corresponding Source.
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
The Corresponding Source for a work in source code form is that same
type `show w'. This is free software, and you are welcome work.
to redistribute it under certain conditions; type `show c'
for details.
6. Conveying Non-Source Forms. network may be denied when the modification itself materially and Termination of your rights under this section does not terminate the A patent license is “discriminatory” if it does not include within the scope
You may convey a covered work in object code form under the terms of adversely affects the operation of the network or violates the rules and licenses of parties who have received copies or rights from you under of its coverage, prohibits the exercise of, or is conditioned on the
sections 4 and 5, provided that you also convey the machine-readable protocols for communication across the network. this License. If your rights have been terminated and not permanently non-exercise of one or more of the rights that are specifically granted
Corresponding Source under the terms of this License, in one of these Corresponding Source conveyed, and Installation Information provided, reinstated, you do not qualify to receive new licenses for the same under this License. You may not convey a covered work if you are a party
ways: in accord with this section must be in a format that is publicly material under section 10. to an arrangement with a third party that is in the business of distributing
documented (and with an implementation available to the public in 9. Acceptance Not Required for Having Copies. software, under which you make payment to the third party based on the
a) Convey the object code in, or embodied in, a physical product extent of your activity of conveying the work, and under which the third
(including a physical distribution medium), accompanied by the source code form), and must require no special password or key for You are not required to accept this License in order to receive or run a
unpacking, reading or copying. party grants, to any of the parties who would receive the covered work
Corresponding Source fixed on a durable physical medium copy of the Program. Ancillary propagation of a covered work occurring from you, a discriminatory patent license (a) in connection with copies of
customarily used for software interchange. 7. Additional Terms. solely as a consequence of using peer-to-peer transmission to receive a the covered work conveyed by you (or copies made from those copies),
b) Convey the object code in, or embodied in, a physical product “Additional permissions” are terms that supplement the terms of this copy likewise does not require acceptance. However, nothing other than or (b) primarily for and in connection with specific products or
(including a physical distribution medium), accompanied by a written License by making exceptions from one or more of its conditions. this License grants you permission to propagate or modify any covered compilations that contain the covered work, unless you entered into that
offer, valid for at least three years and valid for as long as you offer Additional permissions that are applicable to the entire Program shall be work. These actions infringe copyright if you do not accept this License. arrangement, or that patent license was granted, prior to 28 March
spare parts or customer support for that product model, to give treated as though they were included in this License, to the extent that Therefore, by modifying or propagating a covered work, you indicate 2007.
anyone who possesses the object code either (1) a copy of the they are valid under applicable law. If additional permissions apply only to your acceptance of this License to do so.
Nothing in this License shall be construed as excluding or limiting any
Corresponding Source for all the software in the product that is part of the Program, that part may be used separately under those 10. Automatic Licensing of Downstream Recipients. implied license or other defenses to infringement that may otherwise be
covered by this License, on a durable physical medium customarily permissions, but the entire Program remains governed by this License Each time you convey a covered work, the recipient automatically available to you under applicable patent law.
used for software interchange, for a price no more than your without regard to the additional permissions. receives a license from the original licensors, to run, modify and
reasonable cost of physically performing this conveying of source, or 12. No Surrender of Others' Freedom.
When you convey a copy of a covered work, you may at your option propagate that work, subject to this License. You are not responsible for
(2) access to copy the Corresponding Source from a network server remove any additional permissions from that copy, or from any part of it. enforcing compliance by third parties with this License. If conditions are imposed on you (whether by court order, agreement or
at no charge. (Additional permissions may be written to require their own removal in otherwise) that contradict the conditions of this License, they do not
An “entity transaction” is a transaction transferring control of an excuse you from the conditions of this License. If you cannot convey a
c) Convey individual copies of the object code with a copy of the certain cases when you modify the work.) You may place additional organization, or substantially all assets of one, or subdividing an
written offer to provide the Corresponding Source. This alternative is permissions on material, added by you to a covered work, for which you covered work so as to satisfy simultaneously your obligations under this
organization, or merging organizations. If propagation of a covered work License and any other pertinent obligations, then as a consequence you
allowed only occasionally and noncommercially, and only if you have or can give appropriate copyright permission. results from an entity transaction, each party to that transaction who
received the object code with such an offer, in accord with subsection may not convey it at all. For example, if you agree to terms that obligate
Notwithstanding any other provision of this License, for material you add receives a copy of the work also receives whatever licenses to the work you to collect a royalty for further conveying from those to whom you
6b. to a covered work, you may (if authorized by the copyright holders of that the party's predecessor in interest had or could give under the previous convey the Program, the only way you could satisfy both those terms
d) Convey the object code by offering access from a designated place material) supplement the terms of this License with terms: paragraph, plus a right to possession of the Corresponding Source of and this License would be to refrain entirely from conveying the Program.
(gratis or for a charge), and offer equivalent access to the a) Disclaiming warranty or limiting liability differently from the terms of the work from the predecessor in interest, if the predecessor has it or
Corresponding Source in the same way through the same place at no can get it with reasonable efforts. 13. Use with the GNU Affero General Public License.
sections 15 and 16 of this License; or
further charge. You need not require recipients to copy the You may not impose any further restrictions on the exercise of the rights Notwithstanding any other provision of this License, you have permission
Corresponding Source along with the object code. If the place to b) Requiring preservation of specified reasonable legal notices or to link or combine any covered work with a work licensed under version
author attributions in that material or in the Appropriate Legal Notices granted or affirmed under this License. For example, you may not
copy the object code is a network server, the Corresponding Source impose a license fee, royalty, or other charge for exercise of rights 3 of the GNU Affero General Public License into a single combined work,
may be on a different server (operated by you or a third party) that displayed by works containing it; or and to convey the resulting work. The terms of this License will continue
granted under this License, and you may not initiate litigation (including a
supports equivalent copying facilities, provided you maintain clear c) Prohibiting misrepresentation of the origin of that material, or cross-claim or counterclaim in a lawsuit) alleging that any patent claim is to apply to the part which is the covered work, but the special
directions next to the object code saying where to find the requiring that modified versions of such material be marked in infringed by making, using, selling, offering for sale, or importing the requirements of the GNU Affero General Public License, section 13,
Corresponding Source. Regardless of what server hosts the reasonable ways as different from the original version; or Program or any portion of it. concerning interaction through a network will apply to the combination
Corresponding Source, you remain obligated to ensure that it is d) Limiting the use for publicity purposes of names of licensors or as such.
available for as long as needed to satisfy these requirements. 11. Patents.
authors of the material; or 14. Revised Versions of this License.
e) Convey the object code using peer-to-peer transmission, provided A “contributor” is a copyright holder who authorizes use under this
e) Declining to grant rights under trademark law for use of some trade License of the Program or a work on which the Program is based. The The Free Software Foundation may publish revised and/or new versions
you inform other peers where the object code and Corresponding names, trademarks, or service marks; or of the GNU General Public License from time to time. Such new versions
Source of the work are being offered to the general public at no work thus licensed is called the contributor's “contributor version”.
f) Requiring indemnification of licensors and authors of that material by will be similar in spirit to the present version, but may differ in detail to
charge under subsection 6d. A contributor's “essential patent claims” are all patent claims owned or address new problems or concerns.
anyone who conveys the material (or modified versions of it) with controlled by the contributor, whether already acquired or hereafter
A separable portion of the object code, whose source code is excluded contractual assumptions of liability to the recipient, for any liability that Each version is given a distinguishing version number. If the Program
from the Corresponding Source as a System Library, need not be acquired, that would be infringed by some manner, permitted by this
these contractual assumptions directly impose on those licensors and License, of making, using, or selling its contributor version, but do not specifies that a certain numbered version of the GNU General Public
included in conveying the object code work. authors. License “or any later version” applies to it, you have the option of
include claims that would be infringed only as a consequence of further
A “User Product” is either (1) a “consumer product”, which means any All other non-permissive additional terms are considered “further modification of the contributor version. For purposes of this definition, following the terms and conditions either of that numbered version or of
tangible personal property which is normally used for personal, family, or restrictions” within the meaning of section 10. If the Program as you “control” includes the right to grant patent sublicenses in a manner any later version published by the Free Software Foundation. If the
household purposes, or (2) anything designed or sold for incorporation received it, or any part of it, contains a notice stating that it is governed consistent with the requirements of this License. Program does not specify a version number of the GNU General Public
into a dwelling. In determining whether a product is a consumer product, by this License along with a term that is a further restriction, you may License, you may choose any version ever published by the Free
doubtful cases shall be resolved in favor of coverage. For a particular Each contributor grants you a non-exclusive, worldwide, royalty-free Software Foundation.
remove that term. If a license document contains a further restriction but patent license under the contributor's essential patent claims, to make,
product received by a particular user, “normally used” refers to a typical permits relicensing or conveying under this License, you may add to a If the Program specifies that a proxy can decide which future versions of
or common use of that class of product, regardless of the status of the use, sell, offer for sale, import and otherwise run, modify and propagate
covered work material governed by the terms of that license document, the contents of its contributor version. the GNU General Public License can be used, that proxy's public
particular user or of the way in which the particular user actually uses, or provided that the further restriction does not survive such relicensing or statement of acceptance of a version permanently authorizes you to
expects or is expected to use, the product. A product is a consumer conveying. In the following three paragraphs, a “patent license” is any express choose that version for the Program.
product regardless of whether the product has substantial commercial, agreement or commitment, however denominated, not to enforce a
industrial or non-consumer uses, unless such uses represent the only If you add terms to a covered work in accord with this section, you must patent (such as an express permission to practice a patent or covenant Later license versions may give you additional or different permissions.
significant mode of use of the product. place, in the relevant source files, a statement of the additional terms that not to sue for patent infringement). To “grant” such a patent license to a However, no additional obligations are imposed on any author or
apply to those files, or a notice indicating where to find the applicable party means to make such an agreement or commitment not to enforce copyright holder as a result of your choosing to follow a later version.
“Installation Information” for a User Product means any methods, terms.
procedures, authorization keys, or other information required to install a patent against the party. 15. Disclaimer of Warranty.
and execute modified versions of a covered work in that User Product Additional terms, permissive or non-permissive, may be stated in the If you convey a covered work, knowingly relying on a patent license, and THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
from a modified version of its Corresponding Source. The information form of a separately written license, or stated as exceptions; the above the Corresponding Source of the work is not available for anyone to PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
must suffice to ensure that the continued functioning of the modified requirements apply either way. copy, free of charge and under the terms of this License, through a STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
object code is in no case prevented or interfered with solely because 8. Termination. publicly available network server or other readily accessible means, then PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF
modification has been made. you must either (1) cause the Corresponding Source to be so available, ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT
You may not propagate or modify a covered work except as expressly
If you convey an object code work under this section in, or with, or provided under this License. Any attempt otherwise to propagate or or (2) arrange to deprive yourself of the benefit of the patent license for LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
specifically for use in, a User Product, and the conveying occurs as part modify it is void, and will automatically terminate your rights under this this particular work, or (3) arrange, in a manner consistent with the FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO
of a transaction in which the right of possession and use of the User License (including any patent licenses granted under the third paragraph requirements of this License, to extend the patent license to downstream THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
Product is transferred to the recipient in perpetuity or for a fixed term of section 11). recipients. “Knowingly relying” means you have actual knowledge that, SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE
(regardless of how the transaction is characterized), the Corresponding but for the patent license, your conveying the covered work in a country, COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
However, if you cease all violation of this License, then your license from or your recipient's use of the covered work in a country, would infringe
Source conveyed under this section must be accompanied by the
a particular copyright holder is reinstated (a) provisionally, unless and until 16. Limitation of Liability.
Installation Information. But this requirement does not apply if neither you one or more identifiable patents in that country that you have reason to
the copyright holder explicitly and finally terminates your license, and (b) believe are valid. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED
nor any third party retains the ability to install modified object code on the
permanently, if the copyright holder fails to notify you of the violation by TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER
User Product (for example, the work has been installed in ROM). If, pursuant to or in connection with a single transaction or arrangement,
some reasonable means prior to 60 days after the cessation. PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS
The requirement to provide Installation Information does not include a you convey, or propagate by procuring conveyance of, a covered work, PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING
Moreover, your license from a particular copyright holder is reinstated and grant a patent license to some of the parties receiving the covered
requirement to continue to provide support service, warranty, or updates ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
permanently if the copyright holder notifies you of the violation by some work authorizing them to use, propagate, modify or convey a specific
for a work that has been modified or installed by the recipient, or for the DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
reasonable means, this is the first time you have received notice of copy of the covered work, then the patent license you grant is
User Product in which it has been modified or installed. Access to a PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR
violation of this License (for any work) from that copyright holder, and you automatically extended to all recipients of the covered work and works
cure the violation prior to 30 days after your receipt of the notice. DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
based on it.
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO Preamble Although the Lesser General Public License is Less protective of the distribute the same sections as part of a whole which is a work based
OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER users' freedom, it does ensure that the user of a program that is linked on the Library, the distribution of the whole must be on the terms of
OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF The licenses for most software are designed to take away your freedom with the Library has the freedom and the wherewithal to run that program this License, whose permissions for other licensees extend to the
SUCH DAMAGES. to share and change it. By contrast, the GNU General Public Licenses using a modified version of the Library. entire whole, and thus to each and every part regardless of who wrote
are intended to guarantee your freedom to share and change free it.
17. Interpretation of Sections 15 and 16. The precise terms and conditions for copying, distribution and
software--to make sure the software is free for all its users.
If the disclaimer of warranty and limitation of liability provided above modification follow. Pay close attention to the difference between a "work Thus, it is not the intent of this section to claim rights or contest your
This license, the Lesser General Public License, applies to some specially based on the library" and a "work that uses the library". The former rights to work written entirely by you; rather, the intent is to exercise
cannot be given local legal effect according to their terms, reviewing
designated software packages--typically libraries--of the Free Software contains code derived from the library, whereas the latter must be the right to control the distribution of derivative or collective works
courts shall apply local law that most closely approximates an absolute
Foundation and other authors who decide to use it. You can use it too, combined with the library in order to run. based on the Library.
waiver of all civil liability in connection with the Program, unless a
but we suggest you first think carefully about whether this license or the
warranty or assumption of liability accompanies a copy of the Program in In addition, mere aggregation of another work not based on the
return for a fee.
ordinary General Public License is the better strategy to use in any TERMS AND CONDITIONS FOR COPYING, Library with the Library (or with a work based on the Library) on a
particular case, based on the explanations below.
DISTRIBUTION AND MODIFICATION volume of a storage or distribution medium does not bring the other
END OF TERMS AND CONDITIONS When we speak of free software, we are referring to freedom of use, not work under the scope of this License.
price. Our General Public Licenses are designed to make sure that you 0. This License Agreement applies to any software library or other
3. You may opt to apply the terms of the ordinary GNU General Public
How to Apply These Terms to Your New Programs have the freedom to distribute copies of free software (and charge for program which contains a notice placed by the copyright holder or other
License instead of this License to a given copy of the Library. To do this,
this service if you wish); that you receive source code or can get it if you authorized party saying it may be distributed under the terms of this
Lesser General Public License (also called "this License"). Each licensee you must alter all the notices that refer to this License, so that they refer
If you develop a new program, and you want it to be of the greatest want it; that you can change the software and use pieces of it in new free
is addressed as "you". to the ordinary GNU General Public License, version 2, instead of to this
possible use to the public, the best way to achieve this is to make it free programs; and that you are informed that you can do these things.
License. (If a newer version than version 2 of the ordinary GNU General
software which everyone can redistribute and change under these terms. To protect your rights, we need to make restrictions that forbid A "library" means a collection of software functions and/or data prepared Public License has appeared, then you can specify that version instead if
To do so, attach the following notices to the program. It is safest to distributors to deny you these rights or to ask you to surrender these so as to be conveniently linked with application programs (which use you wish.) Do not make any other change in these notices.
attach them to the start of each source file to most effectively state the rights. These restrictions translate to certain responsibilities for you if you some of those functions and data) to form executables.
Once this change is made in a given copy, it is irreversible for that copy,
exclusion of warranty; and each file should have at least the “copyright” distribute copies of the library or if you modify it. The "Library", below, refers to any such software library or work which so the ordinary GNU General Public License applies to all subsequent
line and a pointer to where the full notice is found. For example, if you distribute copies of the library, whether gratis or for a has been distributed under these terms. A "work based on the Library" copies and derivative works made from that copy.
<one line to give the program's name and a brief idea of what it fee, you must give the recipients all the rights that we gave you. You means either the Library or any derivative work under copyright law: that
is to say, a work containing the Library or a portion of it, either verbatim This option is useful when you wish to copy part of the code of the
does.> must make sure that they, too, receive or can get the source code. If you
or with modifications and/or translated straightforwardly into another Library into a program that is not a library.
Copyright (C) <year> <name of author> link other code with the library, you must provide complete object files to
the recipients, so that they can relink them with the library after making language. (Hereinafter, translation is included without limitation in the 4. You may copy and distribute the Library (or a portion or derivative of it,
This program is free software: you can redistribute it and/or modify it changes to the library and recompiling it. And you must show them these term "modification".) under Section 2) in object code or executable form under the terms of
under the terms of the GNU General Public License as published by terms so they know their rights. "Source code" for a work means the preferred form of the work for Sections 1 and 2 above provided that you accompany it with the
the Free Software Foundation, either version 3 of the License, or (at making modifications to it. For a library, complete source code means all complete corresponding machine-readable source code, which must be
We protect your rights with a two-step method: (1) we copyright the
your option) any later version. the source code for all modules it contains, plus any associated interface distributed under the terms of Sections 1 and 2 above on a medium
library, and (2) we offer you this license, which gives you legal permission
definition files, plus the scripts used to control compilation and installation customarily used for software interchange.
This program is distributed in the hope that it will be useful, but to copy, distribute and/or modify the library.
of the library. If distribution of object code is made by offering access to copy from a
WITHOUT ANY WARRANTY; without even the implied warranty of To protect each distributor, we want to make it very clear that there is no
Activities other than copying, distribution and modification are not designated place, then offering equivalent access to copy the source
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. warranty for the free library. Also, if the library is modified by someone
covered by this License; they are outside its scope. The act of running a code from the same place satisfies the requirement to distribute the
See the GNU General Public License for more details. else and passed on, the recipients should know that what they have is
program using the Library is not restricted, and output from such a source code, even though third parties are not compelled to copy the
not the original version, so that the original author's reputation will not be
You should have received a copy of the GNU General Public License program is covered only if its contents constitute a work based on the source along with the object code.
affected by problems that might be introduced by others.
along with this program. If not, see <http://www.gnu.org/licenses/>. Library (independent of the use of the Library in a tool for writing it). 5. A program that contains no derivative of any portion of the Library, but
Finally, software patents pose a constant threat to the existence of any
Whether that is true depends on what the Library does and what the is designed to work with the Library by being compiled or linked with it, is
Also add information on how to contact you by electronic and paper free program. We wish to make sure that a company cannot effectively
program that uses the Library does. called a "work that uses the Library". Such a work, in isolation, is not a
mail. restrict the users of a free program by obtaining a restrictive license from
1. You may copy and distribute verbatim copies of the Library's complete derivative work of the Library, and therefore falls outside the scope of this
a patent holder. Therefore, we insist that any patent license obtained for
If the program does terminal interaction, make it output a short notice like License.
a version of the library must be consistent with the full freedom of use source code as you receive it, in any medium, provided that you
this when it starts in an interactive mode: However, linking a "work that uses the Library" with the Library creates
specified in this license. conspicuously and appropriately publish on each copy an appropriate
<program> Copyright (C) <year> <name of author> copyright notice and disclaimer of warranty; keep intact all the notices an executable that is a derivative of the Library (because it contains
Most GNU software, including some libraries, is covered by the ordinary
that refer to this License and to the absence of any warranty; and portions of the Library), rather than a "work that uses the library". The
This program comes with ABSOLUTELY NO WARRANTY; for details GNU General Public License. This license, the GNU Lesser General
distribute a copy of this License along with the Library. executable is therefore covered by this License. Section 6 states terms
type `show w'. Public License, applies to certain designated libraries, and is quite
You may charge a fee for the physical act of transferring a copy, and you for distribution of such executables.
different from the ordinary General Public License. We use this license for
This is free software, and you are welcome to redistribute it under certain libraries in order to permit linking those libraries into non-free may at your option offer warranty protection in exchange for a fee. When a "work that uses the Library" uses material from a header file that
certain conditions; type `show c' for details. programs. 2. You may modify your copy or copies of the Library or any portion of it, is part of the Library, the object code for the work may be a derivative
thus forming a work based on the Library, and copy and distribute such work of the Library even though the source code is not. Whether this is
The hypothetical commands `show w' and `show c' should show the When a program is linked with a library, whether statically or using a
modifications or work under the terms of Section 1 above, provided that true is especially significant if the work can be linked without the Library,
appropriate parts of the General Public License. Of course, your shared library, the combination of the two is legally speaking a combined
you also meet all of these conditions: or if the work is itself a library. The threshold for this to be true is not
program's commands might be different; for a GUI interface, you would work, a derivative of the original library. The ordinary General Public
precisely defined by law.
use an “about box”. License therefore permits such linking only if the entire combination fits a) The modified work must itself be a software library.
its criteria of freedom. The Lesser General Public License permits more If such an object file uses only numerical parameters, data structure
You should also get your employer (if you work as a programmer) or lax criteria for linking other code with the library. b) You must cause the files modified to carry prominent notices layouts and accessors, and small macros and small inline functions (ten
school, if any, to sign a “copyright disclaimer” for the program, if stating that you changed the files and the date of any change. lines or less in length), then the use of the object file is unrestricted,
necessary. For more information on this, and how to apply and follow the We call this license the "Lesser" General Public License because it does
c) You must cause the whole of the work to be licensed at no charge regardless of whether it is legally a derivative work. (Executables
GNU GPL, see <http://www.gnu.org/licenses/>. Less to protect the user's freedom than the ordinary General Public
to all third parties under the terms of this License. containing this object code plus portions of the Library will still fall under
License. It also provides other free software developers Less of an
The GNU General Public License does not permit incorporating your Section 6.)
advantage over competing non-free programs. These disadvantages are d) If a facility in the modified Library refers to a function or a table of
program into proprietary programs. If your program is a subroutine the reason we use the ordinary General Public License for many libraries. data to be supplied by an application program that uses the facility, Otherwise, if the work is a derivative of the Library, you may distribute the
library, you may consider it more useful to permit linking proprietary However, the Lesser license provides advantages in certain special other than as an argument passed when the facility is invoked, then object code for the work under the terms of Section 6. Any executables
applications with the library. If this is what you want to do, use the GNU circumstances. you must make a good faith effort to ensure that, in the event an containing that work also fall under Section 6, whether or not they are
Lesser General Public License instead of this License. But first, please application does not supply such function or table, the facility still linked directly with the Library itself.
read <http://www.gnu.org/philosophy/why-not-lgpl.html>. For example, on rare occasions, there may be a special need to
encourage the widest possible use of a certain library, so that it becomes operates, and performs whatever part of its purpose remains 6. As an exception to the Sections above, you may also combine or link
meaningful.
GNU Lesser General Public License a de-facto standard. To achieve this, non-free programs must be allowed a "work that uses the Library" with the Library to produce a work
to use the library. A more frequent case is that a free library does the (For example, a function in a library to compute square roots has a containing portions of the Library, and distribute that work under terms of
same job as widely used non-free libraries. In this case, there is little to purpose that is entirely well-defined independent of the application. your choice, provided that the terms permit modification of the work for
Version 2.1, February 1999
gain by limiting the free library to free software only, so we use the Lesser Therefore, Subsection 2d requires that any application-supplied the customer's own use and reverse engineering for debugging such
Copyright (C) 1991, 1999 Free Software Foundation, Inc. General Public License. function or table used by this function must be optional: if the modifications.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA application does not supply it, the square root function must still You must give prominent notice with each copy of the work that the
Everyone is permitted to copy and distribute verbatim copies compute square roots.) Library is used in it and that the Library and its use are covered by this
In other cases, permission to use a particular library in non-free programs
These requirements apply to the modified work as a whole. If License. You must supply a copy of this License. If the work during
of this license document, but changing it is not allowed. enables a greater number of people to use a large body of free software.
identifiable sections of that work are not derived from the Library, and execution displays copyright notices, you must include the copyright
[This is the first released version of the Lesser GPL. It also counts For example, permission to use the GNU C Library in non-free programs
can be reasonably considered independent and separate works in notice for the Library among them, as well as a reference directing the
enables many more people to use the whole GNU operating system, as
as the successor of the GNU Library Public License, version 2, hence themselves, then this License, and its terms, do not apply to those user to the copy of this License. Also, you must do one of these things:
well as its variant, the GNU/Linux operating system.
sections when you distribute them as separate works. But when you
the version number 2.1.]
a) Accompany the work with the complete corresponding machine- distribute the Library at all. For example, if a patent license would not everyone can redistribute and change. You can do so by permitting Modifications. When Covered Code is released as a series of files, a
readable source code for the Library including whatever changes permit royalty-free redistribution of the Library by all those who receive redistribution under these terms (or, alternatively, under the terms of the Modification is:
were used in the work (which must be distributed under Sections 1 copies directly or indirectly through you, then the only way you could ordinary General Public License). A. Any addition to or deletion from the contents of a file containing
and 2 above); and, if the work is an executable linked with the Library, satisfy both it and this License would be to refrain entirely from To apply these terms, attach the following notices to the library. It is Original Code or previous Modifications.
with the complete machine-readable "work that uses the Library", as distribution of the Library. safest to attach them to the start of each source file to most effectively
object code and/or source code, so that the user can modify the B. Any new file that contains any part of the Original Code or
If any portion of this section is held invalid or unenforceable under any convey the exclusion of warranty; and each file should have at least the previous Modifications.
Library and then relink to produce a modified executable containing particular circumstance, the balance of the section is intended to apply, "copyright" line and a pointer to where the full notice is found.
the modified Library. (It is understood that the user who changes the and the section as a whole is intended to apply in other circumstances. 1.10. "Original Code" means Source Code of computer software
contents of definitions files in the Library will not necessarily be able to one line to give the library's name and an idea of what it does. code which is described in the Source Code notice required by Exhibit
recompile the application to use the modified definitions.) It is not the purpose of this section to induce you to infringe any patents Copyright (C) year name of author A as Original Code, and which, at the time of its release under this
or other property right claims or to contest validity of any such claims; License is not already Covered Code governed by this License.
b) Use a suitable shared library mechanism for linking with the Library. this section has the sole purpose of protecting the integrity of the free This library is free software; you can redistribute it and/or
A suitable mechanism is one that (1) uses at run time a copy of the software distribution system which is implemented by public license modify it under the terms of the GNU Lesser General Public 1.10.1. "Patent Claims" means any patent claim(s), now owned or
library already present on the user's computer system, rather than practices. Many people have made generous contributions to the wide hereafter acquired, including without limitation, method, process, and
copying library functions into the executable, and (2) will operate License as published by the Free Software Foundation; either apparatus claims, in any patent Licensable by grantor.
range of software distributed through that system in reliance on
properly with a modified version of the library, if the user installs one, consistent application of that system; it is up to the author/donor to version 2.1 of the License, or (at your option) any later version. 1.11. "Source Code" means the preferred form of the Covered Code
as long as the modified version is interface-compatible with the decide if he or she is willing to distribute software through any other for making modifications to it, including all modules it contains, plus
This library is distributed in the hope that it will be useful,
version that the work was made with. system and a licensee cannot impose that choice. any associated interface definition files, scripts used to control
but WITHOUT ANY WARRANTY; without even the implied warranty of
c) Accompany the work with a written offer, valid for at least three This section is intended to make thoroughly clear what is believed to be compilation and installation of an Executable, or source code
years, to give the same user the materials specified in Subsection 6a, MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. differential comparisons against either the Original Code or another well
a consequence of the rest of this License.
above, for a charge no more than the cost of performing this See the GNU known, available Covered Code of the Contributor's choice. The
distribution. 12. If the distribution and/or use of the Library is restricted in certain Source Code can be in a compressed or archival form, provided the
Lesser General Public License for more details.
countries either by patents or by copyrighted interfaces, the original appropriate decompression or de-archiving software is widely available
d) If distribution of the work is made by offering access to copy from a copyright holder who places the Library under this License may add an You should have received a copy of the GNU Lesser General Public
designated place, offer equivalent access to copy the above specified for no charge.
explicit geographical distribution limitation excluding those countries, so License along with this library; if not, write to the Free Software
materials from the same place. that distribution is permitted only in or among countries not thus 1.12. "You" (or "Your") means an individual or a legal entity exercising
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111- rights under, and complying with all of the terms of, this License or a
e) Verify that the user has already received a copy of these materials excluded. In such case, this License incorporates the limitation as if
1307 USA future version of this License issued under Section 6.1. For legal
or that you have already sent this user a copy. written in the body of this License.
Also add information on how to contact you by electronic and paper entities, "You'' includes any entity which controls, is controlled by, or is
For an executable, the required form of the "work that uses the Library" 13. The Free Software Foundation may publish revised and/or new under common control with You. For purposes of this definition,
mail.
must include any data and utility programs needed for reproducing the versions of the Lesser General Public License from time to time. Such "control'' means (a) the power, direct or indirect, to cause the direction
executable from it. However, as a special exception, the materials to be new versions will be similar in spirit to the present version, but may differ You should also get your employer (if you work as a programmer) or your
or management of such entity, whether by contract or otherwise, or (b)
distributed need not include anything that is normally distributed (in either in detail to address new problems or concerns. school, if any, to sign a "copyright disclaimer" for the library, if necessary.
ownership of more than fifty percent (50%) of the outstanding shares
source or binary form) with the major components (compiler, kernel, and Here is a sample; alter the names:
Each version is given a distinguishing version number. If the Library or beneficial ownership of such entity.
so on) of the operating system on which the executable runs, unless that specifies a version number of this License which applies to it and "any Yoyodyne, Inc., hereby disclaims all copyright interest in
component itself accompanies the executable. 2. Source Code License.
later version", you have the option of following the terms and conditions the library `Frob' (a library for tweaking knobs) written
It may happen that this requirement contradicts the license restrictions of either of that version or of any later version published by the Free 2.1. The Initial Developer Grant. The Initial Developer hereby grants
other proprietary libraries that do not normally accompany the operating Software Foundation. If the Library does not specify a license version by James Random Hacker. You a world-wide, royalty-free, non-exclusive license, subject to third
system. Such a contradiction means you cannot use both them and the number, you may choose any version ever published by the Free signature of Ty Coon, 1 April 1990 party intellectual property claims:
Library together in an executable that you distribute. Software Foundation. Ty Coon, President of Vice (a) under intellectual property rights (other than patent or trademark)
7. You may place library facilities that are a work based on the Library 14. If you wish to incorporate parts of the Library into other free Licensable by Initial Developer to use, reproduce, modify, display,
That's all there is to it! perform, sublicense and distribute the Original Code (or portions
side-by-side in a single library together with other library facilities not programs whose distribution conditions are incompatible with these,
thereof) with or without Modifications, and/or as part of a Larger
MOZILLA PUBLIC LICENSE
covered by this License, and distribute such a combined library, provided write to the author to ask for permission. For software which is
that the separate distribution of the work based on the Library and of the copyrighted by the Free Software Foundation, write to the Free Software Work; and
other library facilities is otherwise permitted, and provided that you do Foundation; we sometimes make exceptions for this. Our decision will be Copyright (c) 2004, Apple Computer, Inc. and The Mozilla Foundation. (b) under Patents Claims infringed by the making, using or selling of
these two things: guided by the two goals of preserving the free status of all derivatives of Original Code, to make, have made, use, practice, sell, and offer for
our free software and of promoting the sharing and reuse of software Copyright (c) 2004-2005 HighPoint Technologies, Inc. sale, and/or otherwise dispose of the Original Code (or portions
a) Accompany the combined library with a copy of the same work
based on the Library, uncombined with any other library facilities. This generally. Copyright (c) 2004-2005 HighPoint Technologies, Inc. thereof).
must be distributed under the terms of the Sections above. (c) the licenses granted in this Section 2.1(a) and (b) are effective on
NO WARRANTY Version 1.1 the date Initial Developer first distributes Original Code under the
b) Give prominent notice with the combined library of the fact that part
terms of this License.
of it is a work based on the Library, and explaining where to find the 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE 1. Definitions.
accompanying uncombined form of the same work. IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED (d) Notwithstanding Section 2.1(b) above, no patent license is
1.0.1. "Commercial Use" means distribution or otherwise making the
8. You may not copy, modify, sublicense, link with, or distribute the BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN granted: 1) for code that You delete from the Original Code; 2)
Covered Code available to a third party.
Library except as expressly provided under this License. Any attempt WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES separate from the Original Code; or 3) for infringements caused by:
otherwise to copy, modify, sublicense, link with, or distribute the Library is PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, 1.1. "Contributor" means each entity that creates or contributes to i) the modification of the Original Code or ii) the combination of the
void, and will automatically terminate your rights under this License. EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, the creation of Modifications. Original Code with other software or devices.
However, parties who have received copies, or rights, from you under THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 1.2. "Contributor Version" means the combination of the Original 2.2. Contributor Grant. Subject to third party intellectual property
this License will not have their licenses terminated so long as such FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE Code, prior Modifications used by a Contributor, and the Modifications claims, each Contributor hereby grants You a world-wide, royalty-free,
parties remain in full compliance. QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. made by that particular Contributor. non-exclusive license
SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST
9. You are not required to accept this License, since you have not signed 1.3. "Covered Code" means the Original Code or Modifications or the (a) under intellectual property rights (other than patent or trademark)
OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
it. However, nothing else grants you permission to modify or distribute combination of the Original Code and Modifications, in each case Licensable by Contributor, to use, reproduce, modify, display,
the Library or its derivative works. These actions are prohibited by law if 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR including portions thereof. perform, sublicense and distribute the Modifications created by
you do not accept this License. Therefore, by modifying or distributing AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY such Contributor (or portions thereof) either on an unmodified basis,
1.4. "Electronic Distribution Mechanism" means a mechanism
the Library (or any work based on the Library), you indicate your OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE with other Modifications, as Covered Code and/or as part of a
generally accepted in the software development community for the
acceptance of this License to do so, and all its terms and conditions for LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR Larger Work; and
electronic transfer of data.
copying, distributing or modifying the Library or works based on it. DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR 1.5. "Executable" means Covered Code in any form other than (b) under Patent Claims infringed by the making, using, or selling of
10. Each time you redistribute the Library (or any work based on the Source Code. Modifications made by that Contributor either alone and/or in
INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO
Library), the recipient automatically receives a license from the original combination with its Contributor Version (or portions of such
LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR 1.6. "Initial Developer" means the individual or entity identified as the
licensor to copy, distribute, link with or modify the Library subject to combination), to make, use, sell, offer for sale, have made, and/or
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF Initial Developer in the Source Code notice required by Exhibit A.
these terms and conditions. You may not impose any further restrictions otherwise dispose of: 1) Modifications made by that Contributor (or
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
on the recipients' exercise of the rights granted herein. You are not
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE 1.7. "Larger Work" means a work which combines Covered Code or portions thereof); and 2) the combination of Modifications made by
responsible for enforcing compliance by third parties with this License. portions thereof with code not governed by the terms of this License. that Contributor with its Contributor Version (or portions of such
POSSIBILITY OF SUCH DAMAGES.
11. If, as a consequence of a court judgment or allegation of patent 1.8. "License" means this document. combination).
infringement or for any other reason (not limited to patent issues), END OF TERMS AND CONDITIONS 1.8.1. "Licensable" means having the right to grant, to the maximum (c) the licenses granted in Sections 2.2(a) and 2.2(b) are effective on
conditions are imposed on you (whether by court order, agreement or extent possible, whether at the time of the initial grant or subsequently the date Contributor first makes Commercial Use of the Covered
otherwise) that contradict the conditions of this License, they do not Code.
excuse you from the conditions of this License. If you cannot distribute How to Apply These Terms to Your New Libraries acquired, any and all of the rights conveyed herein.
1.9. "Modifications" means any addition to or deletion from the (d) Notwithstanding Section 2.2(b) above, no patent license is
so as to satisfy simultaneously your obligations under this License and granted: 1) for any code that Contributor has deleted from the
If you develop a new library, and you want it to be of the greatest substance or structure of either the Original Code or any previous
any other pertinent obligations, then as a consequence you may not
possible use to the public, we recommend making it free software that
Contributor Version; 2) separate from the Contributor Version; 3) for Developer or any Contributor. You must make it absolutely clear than RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER unenforceable, such provision shall be reformed only to the extent
infringements caused by: i) third party modifications of Contributor any such warranty, support, indemnity or liability obligation is offered by CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY necessary to make it enforceable. This License shall be governed by
Version or ii) the combination of Modifications made by that You alone, and You hereby agree to indemnify the Initial Developer and SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF California law provisions (except to the extent applicable law, if any,
Contributor with other software (except as part of the Contributor every Contributor for any liability incurred by the Initial Developer or WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. provides otherwise), excluding its conflict-of-law provisions. With
Version) or other devices; or 4) under Patent Claims infringed by such Contributor as a result of warranty, support, indemnity or liability NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER respect to disputes in which at least one party is a citizen of, or an
Covered Code in the absence of Modifications made by that terms You offer. EXCEPT UNDER THIS DISCLAIMER. entity chartered or registered to do business in the United States of
Contributor. 3.6. Distribution of Executable Versions. You may distribute Covered 8. TERMINATION. America, any litigation relating to this License shall be subject to the
3. Distribution Obligations. Code in Executable form only if the requirements of Section 3.1-3.5 jurisdiction of the Federal Courts of the Northern District of California,
8.1. This License and the rights granted hereunder will terminate with venue lying in Santa Clara County, California, with the losing party
3.1. Application of License. The Modifications which You create or to have been met for that Covered Code, and if You include a notice automatically if You fail to comply with terms herein and fail to cure
stating that the Source Code version of the Covered Code is available responsible for costs, including without limitation, court costs and
which You contribute are governed by the terms of this License, such breach within 30 days of becoming aware of the breach. All reasonable attorneys' fees and expenses. The application of the United
including without limitation Section 2.2. The Source Code version of under the terms of this License, including a description of how and sublicenses to the Covered Code which are properly granted shall
where You have fulfilled the obligations of Section 3.2. The notice must Nations Convention on Contracts for the International Sale of Goods is
Covered Code may be distributed only under the terms of this License survive any termination of this License. Provisions which, by their expressly excluded. Any law or regulation which provides that the
or a future version of this License released under Section 6.1, and You be conspicuously included in any notice in an Executable version, nature, must remain in effect beyond the termination of this License
related documentation or collateral in which You describe recipients' language of a contract shall be construed against the drafter shall not
must include a copy of this License with every copy of the Source shall survive. apply to this License.
Code You distribute. You may not offer or impose any terms on any rights relating to the Covered Code. You may distribute the Executable
version of Covered Code or ownership rights under a license of Your 8.2. If You initiate litigation by asserting a patent infringement claim 12. RESPONSIBILITY FOR CLAIMS.
Source Code version that alters or restricts the applicable version of (excluding declatory judgment actions) against Initial Developer or a
this License or the recipients' rights hereunder. However, You may choice, which may contain terms different from this License, provided As between Initial Developer and the Contributors, each party is
that You are in compliance with the terms of this License and that the Contributor (the Initial Developer or Contributor against whom You file
include an additional document offering the additional rights described such action is referred to as "Participant") alleging that: responsible for claims and damages arising, directly or indirectly, out of
in Section 3.5. license for the Executable version does not attempt to limit or alter the its utilization of rights under this License and You agree to work with
recipient's rights in the Source Code version from the rights set forth in (a) such Participant's Contributor Version directly or indirectly infringes Initial Developer and Contributors to distribute such responsibility on an
3.2. Availability of Source Code. Any Modification which You create this License. If You distribute the Executable version under a different any patent, then any and all rights granted by such Participant to You
or to which You contribute must be made available in Source Code equitable basis. Nothing herein is intended or shall be deemed to
license You must make it absolutely clear that any terms which differ under Sections 2.1 and/or 2.2 of this License shall, upon 60 days constitute any admission of liability.
form under the terms of this License either on the same media as an from this License are offered by You alone, not by the Initial Developer notice from Participant terminate prospectively, unless if within 60 days
Executable version or via an accepted Electronic Distribution or any Contributor. You hereby agree to indemnify the Initial Developer after receipt of notice You either: (i) agree in writing to pay Participant a 13. MULTIPLE-LICENSED CODE.
Mechanism to anyone to whom you made an Executable version and every Contributor for any liability incurred by the Initial Developer or mutually agreeable reasonable royalty for Your past and future use of Initial Developer may designate portions of the Covered Code as
available; and if made available via Electronic Distribution Mechanism, such Contributor as a result of any such terms You offer. Modifications made by such Participant, or (ii) withdraw Your litigation Multiple-Licensed. Multiple-Licensedmeans that the Initial Developer
must remain available for at least twelve (12) months after the date it claim with respect to the Contributor Version against such Participant. permits you to utilize portions of the Covered Code under Your choice
initially became available, or at least six (6) months after a subsequent 3.7. Larger Works. You may create a Larger Work by combining
Covered Code with other code not governed by the terms of this If within 60 days of notice, a reasonable royalty and payment of the MPL or the alternative licenses, if any, specified by the Initial
version of that particular Modification has been made available to such arrangement are not mutually agreed upon in writing by the parties or Developer in the file described in Exhibit A.
recipients. You are responsible for ensuring that the Source Code License and distribute the Larger Work as a single product. In such a
case, You must make sure the requirements of this License are fulfilled the litigation claim is not withdrawn, the rights granted by Participant to
version remains available even if the Electronic Distribution Mechanism You under Sections 2.1 and/or 2.2 automatically terminate at the EXHIBIT A -Mozilla Public License.
is maintained by a third party. for the Covered Code.
expiration of the 60 day notice period specified above. The contents of this file are subject to the Mozilla Public License
3.3. Description of Modifications. You must cause all Covered Code 4. Inability to Comply Due to Statute or Regulation. Version 1.1 (the "License"); you may not use this file except in
(b) any software, hardware, or device, other than such Participant's
to which You contribute to contain a file documenting the changes You If it is impossible for You to comply with any of the terms of this License Contributor Version, directly or indirectly infringes any patent, then any compliance with the License. You may obtain a copy of the License at
made to create that Covered Code and the date of any change. You with respect to some or all of the Covered Code due to statute, judicial rights granted to You by such Participant under Sections 2.1(b) and http://www.mozilla.org/MPL/
must include a prominent statement that the Modification is derived, order, or regulation then You must: (a) comply with the terms of this 2.2(b) are revoked effective as of the date You first made, used, sold, Software distributed under the License is distributed on an "AS IS"
directly or indirectly, from Original Code provided by the Initial License to the maximum extent possible; and (b) describe the limitations distributed, or had made, Modifications made by that Participant. basis, WITHOUT WARRANTY OF ANY KIND, either express or implied.
Developer and including the name of the Initial Developer in (a) the and the code they affect. Such description must be included in the
8.3. If You assert a patent infringement claim against Participant See the License for the specific language governing rights and
Source Code, and (b) in any notice in an Executable version or related LEGAL file described in Section 3.4 and must be included with all limitations under the License.
documentation in which You describe the origin or ownership of the distributions of the Source Code. Except to the extent prohibited by alleging that such Participant's Contributor Version directly or indirectly
Covered Code. statute or regulation, such description must be sufficiently detailed for a infringes any patent where such claim is resolved (such as by license or The Original Code is ______________________________________.
recipient of ordinary skill to be able to understand it. settlement) prior to the initiation of patent infringement litigation, then
3.4. Intellectual Property Matters the reasonable value of the licenses granted by such Participant under
The Initial Developer of the Original Code is
5. Application of this License. ________________________. Portions created by
(a) Third Party Claims. If Contributor has knowledge that a license Sections 2.1 or 2.2 shall be taken into account in determining the ______________________ are Copyright (C) ______
under a third party's intellectual property rights is required to This License applies to code to which the Initial Developer has attached amount or value of any payment or license. _______________________. All Rights Reserved.
exercise the rights granted by such Contributor under Sections 2.1 the notice in Exhibit A and to related Covered Code. 8.4. In the event of termination under Sections 8.1 or 8.2 above, all
or 2.2, Contributor must include a text file with the Source Code Contributor(s): ______________________________________.
6. Versions of the License. end user license agreements (excluding distributors and resellers)
distribution titled "LEGAL'' which describes the claim and the party which have been validly granted by You or any distributor hereunder Alternatively, the contents of this file may be used under the terms of
making the claim in sufficient detail that a recipient will know whom 6.1. New Versions. Netscape Communications Corporation the _____ license (the [___] License), in which case the provisions of
(''Netscape'') may publish revised and/or new versions of the License prior to termination shall survive termination.
to contact. If Contributor obtains such knowledge after the [______] License are applicable instead of those above. If you wish to
Modification is made available as described in Section 3.2, from time to time. Each version will be given a distinguishing version 9. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND allow use of your version of this file only under the terms of the [____]
Contributor shall promptly modify the LEGAL file in all copies number. UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING License and not to allow others to use your version of this file under the
Contributor makes available thereafter and shall take other steps 6.2. Effect of New Versions. Once Covered Code has been published NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE MPL, indicate your decision by deleting the provisions above and
(such as notifying appropriate mailing lists or newsgroups) under a particular version of the License, You may always continue to INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY replace them with the notice and other provisions required by the [___]
reasonably calculated to inform those who received the Covered use it under the terms of that version. You may also choose to use DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF License. If you do not delete the provisions above, a recipient may use
Code that new knowledge has been obtained. such Covered Code under the terms of any subsequent version of the SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, your version of this file under either the MPL or the [___] License."
License published by Netscape. No one other than Netscape has the SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY
(b) Contributor APIs. If Contributor's Modifications include an CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR [NOTE: The text of this Exhibit A may differ slightly from the text of the
application programming interface and Contributor has knowledge right to modify the terms applicable to Covered Code created under notices in the Source Code files of the Original Code. You should use
this License. LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR
of patent licenses which are reasonably necessary to implement MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES the text of this Exhibit A rather than the text found in the Original Code
that API, Contributor must also include this information in the 6.3. Derivative Works. If You create or use a modified version of this OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED Source Code for Your Modifications.]
LEGAL file. License (which you may only do in order to apply it to code which is OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF
(c) Representations. not already Covered Code governed by this License), You must (a)
rename Your license so that the phrases ''Mozilla'', ''MOZILLAPL'',
LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR BSD Two Clause License
Contributor represents that, except as disclosed pursuant to PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE
''MOZPL'', ''Netscape'', "MPL", ''NPL'' or any confusingly similar TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. Copyright (c) 2004-2005 HighPoint Technologies, Inc.
Section 3.4(a) above, Contributor believes that Contributor's phrase do not appear in your license (except to note that your license
Modifications are Contributor's original creation(s) and/or SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR All rights reserved.
differs from this License) and (b) otherwise make it clear that Your LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO
Contributor has sufficient rights to grant the rights conveyed by this version of the license contains terms which differ from the Mozilla Redistribution and use in source and binary forms, with or without
License. THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.
Public License and Netscape Public License. (Filling in the name of the modification, are permitted provided that the following conditions are
3.5. Required Notices. You must duplicate the notice in Exhibit A in Initial Developer, Original Code or Contributor in the notice described in 10. U.S. GOVERNMENT END USERS. met:
each file of the Source Code. If it is not possible to put such notice in a Exhibit A shall not of themselves be deemed to be modifications of The Covered Code is a ''commercial item,'' as that term is defined in 1. Redistributions of source code must retain the above copyright
particular Source Code file due to its structure, then You must include this License.) 48 C.F.R. 2.101 (Oct. 1995), consisting of ''commercial computer notice, this list of conditions and the following disclaimer.
such notice in a location (such as a relevant directory) where a user 7. DISCLAIMER OF WARRANTY. COVERED CODE IS PROVIDED software'' and ''commercial computer software documentation,'' as
would be likely to look for such a notice. If You created one or more 2. Redistributions in binary form must reproduce the above copyright
UNDER THIS LICENSE ON AN "AS IS'' BASIS, WITHOUT WARRANTY such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with
Modification(s) You may add your name as a Contributor to the notice notice, this list of conditions and the following disclaimer in the
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June
described in Exhibit A. You must also duplicate this License in any documentation and/or other materials provided with the distribution.
WITHOUT LIMITATION, WARRANTIES THAT THE COVERED CODE IS 1995), all U.S. Government End Users acquire Covered Code with only
documentation for the Source Code where You describe recipients' FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR those rights set forth herein.
rights or ownership rights relating to Covered Code. You may choose PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE 11. MISCELLANEOUS.
to offer, and to charge a fee for, warranty, support, indemnity or liability QUALITY AND PERFORMANCE OF THE COVERED CODE IS WITH
obligations to one or more recipients of Covered Code. However, You This License represents the complete agreement concerning subject
YOU. SHOULD ANY COVERED CODE PROVE DEFECTIVE IN ANY matter hereof. If any provision of this License is held to be
may do so only on Your own behalf, and not on behalf of the Initial
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY Copyright (c) 2012, AUTHORS.txt (http://jqueryui.com/about) power, direct or indirect, to cause the direction or management of such Works, in at least one of the following places: within a NOTICE text file
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED Copyright (c) 2010 “Cowboy” Ben Alman entity, whether by contract or otherwise, or (ii) ownership of fifty percent distributed as part of the Derivative Works; within the Source form or
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS (50%) or more of the outstanding shares, or (iii) beneficial ownership of documentation, if provided along with the Derivative Works; or, within a
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT Copyright (c) 2009-2011 Brantley Harris such entity. display generated by the Derivative Works, if and wherever such
SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, Copyright (c) 2011-2012 Timo Tijhof "You" (or "Your") shall mean an individual or Legal Entity exercising third-party notices normally appear. The contents of the NOTICE file
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL Copyright (c) 2006-2011 Sam Collett (http://www.texotela.co.uk) permissions granted by this License. are for informational purposes only and do not modify the License. You
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF may add Your own attribution notices within Derivative Works that You
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Copyright (c) 2009 Wroclaw "Source" form shall mean the preferred form for making modifications, distribute, alongside or as an addendum to the NOTICE text from the
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND Copyright (c) 2008-2012 Dmitry Baranovskiy including but not limited to software source code, documentation source, Work, provided that such additional attribution notices cannot be
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT and configuration files. construed as modifying the License.
Copyright (c) 2008-2012 Sencha Labs
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) "Object" form shall mean any form resulting from mechanical You may add Your own copyright statement to Your modifications and
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF Copyright (c) 2007,2014 jQuery Foundation and other contributors transformation or translation of a Source form, including but not limited to may provide additional or different license terms and conditions for use,
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. compiled object code, generated documentation, and conversions to reproduction, or distribution of Your modifications, or for any such
Permission is hereby granted, free of charge, to any person obtaining a
other media types. Derivative Works as a whole, provided Your use, reproduction, and
copy of this software and associated documentation files (the
BSD 3-clause License "Software"), to deal in the Software without restriction, including without "Work" shall mean the work of authorship, whether in Source or Object distribution of the Work otherwise complies with the conditions stated in
limitation the rights to use, copy, modify, merge, publish, distribute, form, made available under the License, as indicated by a copyright this License.
Copyright (c) 2000~2013, Marvell International Ltd. notice that is included in or attached to the work (an example is provided
sublicense, and/or sell copies of the Software, and to permit persons to 5. Submission of Contributions. Unless You explicitly state otherwise,
Copyright (c) 2008-2009, Alex Weber. whom the Software is furnished to do so, subject to the following in the Appendix below). any Contribution intentionally submitted for inclusion in the Work by You
Copyright (c) 2005, Tom Wu. conditions: "Derivative Works" shall mean any work, whether in Source or Object to the Licensor shall be under the terms and conditions of this License,
Copyright (c) 2000-2009, Paul Johnston. form, that is based on (or derived from) the Work and for which the without any additional terms or conditions. Notwithstanding the above,
The above copyright notice and this permission notice shall be included
editorial revisions, annotations, elaborations, or other modifications nothing herein shall supersede or modify the terms of any separate
Copyright (c) 1994-1997, Thomas G. Lane. in all copies or substantial portions of the Software.
represent, as a whole, an original work of authorship. For the purposes license agreement you may have executed with Licensor regarding such
Copyright (c) 2009, 2011, D. R. Commander. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF of this License, Derivative Works shall not include works that remain Contributions.
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO separable from, or merely link (or bind by name) to the interfaces of, the 6. Trademarks. This License does not grant permission to use the trade
Copyright (c) 2009 Texas Instruments Incorporated - http://www.ti.com/
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A Work and Derivative Works thereof. names, trademarks, service marks, or product names of the Licensor,
Copyright (c) 2006 Alexander Chemeris. PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT "Contribution" shall mean any work of authorship, including the original except as required for reasonable and customary use in describing the
Copyright (c) 2003 Sun Microsystems, Inc. SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR version of the Work and any modifications or additions to that Work or origin of the Work and reproducing the content of the NOTICE file.
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN Derivative Works thereof, that is intentionally submitted to Licensor for
Copyright (c) 2010-2015, The Dojo Foundation. 7. Disclaimer of Warranty. Unless required by applicable law or agreed
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT inclusion in the Work by the copyright owner or by an individual or Legal
Copyright (c) 2005-2007 Paul Hsieh. to in writing, Licensor provides the Work (and each Contributor provides
OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR Entity authorized to submit on behalf of the copyright owner. For the its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR
Copyright (c) Alexandru Marasteanu. OTHER DEALINGS IN THE SOFTWARE. purposes of this definition, "submitted" means any form of electronic, CONDITIONS OF ANY KIND, either express or implied, including, without
Copyright (c) 2003, 2010, Dr Brian Gladman, Worcester, UK. verbal, or written communication sent to the Licensor or its limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT,
Copyright (c) 2002-2008, Milan Ikits <milan ikits[]ieee org> libxml2 License representatives, including but not limited to communication on electronic MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You
mailing lists, source code control systems, and issue tracking systems are solely responsible for determining the appropriateness of using or
Copyright (c) 2002-2008, Marcelo E. Magallon <mmagallo[]debian org> Except where otherwise noted in the source code (e.g. the files hash.c, that are managed by, or on behalf of, the Licensor for the purpose of redistributing the Work and assume any risks associated with Your
Copyright (c) 2002, Lev Povalahev. list.c and the trio files, which are covered by a similar licence but with discussing and improving the Work, but excluding communication that is exercise of permissions under this License.
different Copyright notices) all the files are: conspicuously marked or otherwise designated in writing by the
Copyright (c) 2007 The Khronos Group Inc. copyright owner as "Not a Contribution." 8. Limitation of Liability. In no event and under no legal theory, whether
Copyright (C) 1998-2003 Daniel Veillard. All Rights Reserved. in tort (including negligence), contract, or otherwise, unless required by
Copyright (c) 2004, Jan Kneschke, incremental "Contributor" shall mean Licensor and any individual or Legal Entity on
Permission is hereby granted, free of charge, to any person obtaining a applicable law (such as deliberate and grossly negligent acts) or agreed
All rights reserved. copy of this software and associated documentation files (the behalf of whom a Contribution has been received by Licensor and to in writing, shall any Contributor be liable to You for damages, including
Redistribution and use in source and binary forms, with or without "Software"), to deal in the Software without restriction, including without subsequently incorporated within the Work. any direct, indirect, special, incidental, or consequential damages of any
modification, are permitted provided that the following conditions are limitation the rights to use, copy, modify, merge, publish, distribute, 2. Grant of Copyright License. Subject to the terms and conditions of character arising as a result of this License or out of the use or inability to
met: sublicense, and/or sell copies of the Software, and to permit persons to this License, each Contributor hereby grants to You a perpetual, use the Work (including but not limited to damages for loss of goodwill,
• Redistributions of source code must retain the above copyright notice, whom the Software is furnished to do so, subject to the following worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright work stoppage, computer failure or malfunction, or any and all other
this list of conditions and the following disclaimer. conditions: license to reproduce, prepare Derivative Works of, publicly display, commercial damages or losses), even if such Contributor has been
The above copyright notice and this permission notice shall be included publicly perform, sublicense, and distribute the Work and such Derivative advised of the possibility of such damages.
• Redistributions in binary form must reproduce the above copyright
in all copies or substantial portions of the Software. Works in Source or Object form. 9. Accepting Warranty or Additional Liability. While redistributing the
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF 3. Grant of Patent License. Subject to the terms and conditions of this Work or Derivative Works thereof, You may choose to offer, and charge a
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO License, each Contributor hereby grants to You a perpetual, worldwide, fee for, acceptance of support, warranty, indemnity, or other liability
• Neither the name of the <ORGANIZATION> nor the names of its
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A non-exclusive, no-charge, royalty-free, irrevocable (except as stated in obligations and/or rights consistent with this License. However, in
contributors may be used to endorse or promote products derived accepting such obligations, You may act only on Your own behalf and on
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT this section) patent license to make, have made, use, offer to sell, sell,
from this software without specific prior written permission. Your sole responsibility, not on behalf of any other Contributor, and only if
SHALL THE DANIEL VEILLARD BE LIABLE FOR ANY CLAIM, import, and otherwise transfer the Work, where such license applies only
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF to those patent claims licensable by such Contributor that are necessarily You agree to indemnify, defend, and hold each Contributor harmless for
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN infringed by their Contribution(s) alone or by combination of their any liability incurred by, or claims asserted against, such Contributor by
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER Contribution(s) with the Work to which such Contribution(s) was reason of your accepting any such warranty or additional liability.
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A DEALINGS IN THE SOFTWARE. submitted. If You institute patent litigation against any entity (including a
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE cross-claim or counterclaim in a lawsuit) alleging that the Work or a END OF TERMS AND CONDITIONS
COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY Except as contained in this notice, the name of Daniel Veillard shall not Contribution incorporated within the Work constitutes direct or
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR be used in advertising or otherwise to promote the sale, use or other contributory patent infringement, then any patent licenses granted to You
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, dealings in this Software without prior written authorization from him. under this License for that Work shall terminate as of the date such APPENDIX: How to apply the Apache License to your
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF litigation is filed. work
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER Apache License 4. Redistribution. You may reproduce and distribute copies of the Work To apply the Apache License to your work, attach the following
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Version 2.0, January 2004 or Derivative Works thereof in any medium, with or without modifications, boilerplate notice, with the fields enclosed by brackets "[]" replaced with
and in Source or Object form, provided that You meet the following your own identifying information. (Don't include the brackets!) The text
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Copyright (c) 2015 Saminda Abeyruwan (saminda@cs.miami.edu) conditions: should be enclosed in the appropriate comment syntax for the file
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE. http://www.apache.org/licenses/ a. You must give any other recipients of the Work or Derivative Works a format. We also recommend that a file or class name and description of
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND copy of this License; and purpose be included on the same "printed page" as the copyright notice
The MIT License DISTRIBUTION for easier identification within third-party archives.
b. You must cause any modified files to carry prominent notices stating
1. Definitions. that You changed the files; and Copyright [yyyy] [name of copyright owner] Licensed under the Apache
Copyright (c) 2008-2010 Adrian Tosca License, Version 2.0 (the "License"); you may not use this file except in
"License" shall mean the terms and conditions for use, reproduction, and c. You must retain, in the Source form of any Derivative Works that You
Copyright (c) 2010-2011 Ittrium LLC compliance with the License. You may obtain a copy of the License at
distribution as defined by Sections 1 through 9 of this document. distribute, all copyright, patent, trademark, and attribution notices from
http://www.apache.org/licenses/LICENSE-2.0 Unless required by
Copyright (c) 2009 Dave Gamble the Source form of the Work, excluding those notices that do not
"Licensor" shall mean the copyright owner or entity authorized by the applicable law or agreed to in writing, software distributed under the
pertain to any part of the Derivative Works; and
Copyright (c) 2008-2011 Martin Wendt copyright owner that is granting the License. License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
d. If the Work includes a "NOTICE" text file as part of its distribution, CONDITIONS OF ANY KIND, either express or implied. See the License
Copyright (c) 2003-2005 Tom Wu "Legal Entity" shall mean the union of the acting entity and all other then any Derivative Works that You distribute must include a readable
entities that control, are controlled by, or are under common control with for the specific language governing permissions and limitations under the
Copyright (c) 2008 Tony Tomov copy of the attribution notices contained within such NOTICE file, License.
that entity. For the purposes of this definition, "control" means (i) the excluding those notices that do not pertain to any part of the Derivative
The zlib/libpng License Microsoft Public License (Ms-PL) This License is entered between You, the individual or other entity 4. Patent License. Subject to the terms and conditions of this
reading or otherwise making use of the Work licensed pursuant to this License, each Author hereby grants to You a perpetual, worldwide,
Copyright (c) 2011 Lee Thomason Copyright (c) 2009 Wong Shao Voon License and the individual or other entity which offers the Work under the non-exclusive, no-charge, royalty-free, irrevocable (except as stated in
Copyright (c) 1995-2012 Jean-loup Gailly and Mark Adler Copyright (c) 1998-2012 Glenn Randers-Pehrson terms of this License ("Author"). this section) patent license to make, have made, use, import, and
otherwise transfer the Work.
Copyright (c) 1998-2012 Glenn Randers-Pehrson This license governs use of the accompanying software. If you use the License 5. Restrictions. The license granted in Section 3 above is expressly
Copyright (c) 2003-2005 Hector Mauricio Rodriguez Segura software, you accept this license. If you do not accept the license, do not
use the software. made subject to and limited by the following restrictions:
THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS
Copyright (c) 1995-2009 Nullsoft and Contributors OF THIS CODE PROJECT OPEN LICENSE ("LICENSE"). THE WORK IS a. You agree not to remove any of the original copyright, patent,
1. Definitions
Copyright (c) 2002-2008 Davide Pizzolato PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. trademark, and attribution notices and associated disclaimers that
The terms "reproduce," "reproduction," "derivative works," and ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER may appear in the Source Code or Executable Files.
This software is provided 'as-is', without any express or implied warranty. "distribution" have the same meaning here as under U.S. copyright THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.
law. b. You agree not to advertise or in any way imply that this Work is a
In no event will the authors be held liable for any damages arising from
BY EXERCISING ANY RIGHTS TO THE WORK PROVIDED HEREIN, product of Your own.
the use of this software.; A "contribution" is the original software, or any additions or changes to YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS c. The name of the Author may not be used to endorse or promote
Permission is granted to anyone to use this software for any purpose, the software. LICENSE. THE AUTHOR GRANTS YOU THE RIGHTS CONTAINED products derived from the Work without the prior written consent of
including commercial applications, and to alter it and redistribute it freely, A "contributor" is any person that distributes its contribution under this HEREIN IN CONSIDERATION OF YOUR ACCEPTANCE OF SUCH the Author.
subject to the following restrictions: license. TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO ACCEPT AND
d. You agree not to sell, lease, or rent any part of the Work. This
1. The origin of this software must not be misrepresented; you must "Licensed patents" are a contributor's patent claims that read directly BE BOUND BY THE TERMS OF THIS LICENSE, YOU CANNOT MAKE
does not restrict you from including the Work or any part of the
not claim that you wrote the original software. If you use this software on its contribution. ANY USE OF THE WORK.
Work inside a larger software distribution that itself is being sold.
in a product, an acknowledgment in the product documentation would 1. Definitions.
2. Grant of Rights The Work by itself, though, cannot be sold, leased or rented.
be appreciated but is not required.
A. Copyright Grant- Subject to the terms of this license, including a. "Articles" means, collectively, all articles written by Author which e. You may distribute the Executable Files and Source Code only
2. Altered source versions must be plainly marked as such, and must describes how the Source Code and Executable Files for the Work
the license conditions and limitations in section 3, each contributor under the terms of this License, and You must include a copy of, or
not be misrepresented as being the original software. may be used by a user.
grants you a non-exclusive, worldwide, royalty-free copyright license the Uniform Resource Identifier for, this License with every copy of
3. This notice may not be removed or altered from any source to reproduce its contribution, prepare derivative works of its b. "Author" means the individual or entity that offers the Work the Executable Files or Source Code You distribute and ensure that
distribution. contribution, and distribute its contribution or any derivative works under the terms of this License. anyone receiving such Executable Files and Source Code agrees
that you create. that the terms of this License apply to such Executable Files and/or
c. "Derivative Work" means a work based upon the Work or upon
Boost Software License - Version 1.0 B. Patent Grant- Subject to the terms of this license, including the the Work and other pre-existing works.
Source Code. You may not offer or impose any terms on the Work
that alter or restrict the terms of this License or the recipients'
license conditions and limitations in section 3, each contributor d. "Executable Files" refer to the executables, binary files, exercise of the rights granted hereunder. You may not sublicense
August 17th, 2003 grants you a non-exclusive, worldwide, royalty-free license under its configuration and any required data files included in the Work. the Work. You must keep intact all notices that refer to this License
licensed patents to make, have made, use, sell, offer for sale,
Permission is hereby granted, free of charge, to any person or e. "Publisher" means the provider of the website, magazine, and to the disclaimer of warranties. You may not distribute the
import, and/or otherwise dispose of its contribution in the software
organization obtaining a copy of the software and accompanying CD-ROM, DVD or other medium from or by which the Work is Executable Files or Source Code with any technological measures
or derivative works of the contribution in the software.
documentation covered by this license (the "Software") to use, obtained by You. that control access or use of the Work in a manner inconsistent with
3. Conditions and Limitations the terms of this License.
reproduce, display, distribute, execute, and transmit the Software, and to f. "Source Code" refers to the collection of source code and
prepare derivative works of the Software, and to permit third-parties to A. No Trademark License- This license does not grant you rights to configuration files used to create the Executable Files. f. You agree not to use the Work for illegal, immoral or improper
whom the Software is furnished to do so, all subject to the following: use any contributors' name, logo, or trademarks. purposes, or on pages containing illegal, immoral or improper
g. "Standard Version" refers to such a Work if it has not been material. The Work is subject to applicable export laws. You agree
The copyright notices in the Software and this entire statement, including B. If you bring a patent claim against any contributor over patents modified, or has been modified in accordance with the consent of
the above license grant, this restriction and the following disclaimer, must that you claim are infringed by the software, your patent license to comply with all such laws and regulations that may apply to the
the Author, such consent being in the full discretion of the Author. Work after Your receipt of the Work.
be included in all copies of the Software, in whole or in part, and all from such contributor to the software ends automatically.
h. "Work" refers to the collection of files distributed by the 6. Representations, Warranties and Disclaimer. THIS WORK IS
derivative works of the Software, unless such copies or derivative works C. If you distribute any portion of the software, you must retain all Publisher, including the Source Code, Executable Files, binaries, PROVIDED "AS IS", "WHERE IS" AND "AS AVAILABLE", WITHOUT
are solely in the form of machine-executable object code generated by a copyright, patent, trademark, and attribution notices that are data files, documentation, whitepapers and the Articles. ANY EXPRESS OR IMPLIED WARRANTIES OR CONDITIONS OR
source language processor. present in the software.
i. "You" is you, an individual or entity wishing to use the Work and GUARANTEES. YOU, THE USER, ASSUME ALL RISK IN ITS USE,
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF D. If you distribute any portion of the software in source code form, exercise your rights under this License. INCLUDING COPYRIGHT INFRINGEMENT, PATENT INFRINGEMENT,
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO you may do so only under this license by including a complete copy
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A 2. Fair Use/Fair Use Rights. Nothing in this License is intended to SUITABILITY, ETC. AUTHOR EXPRESSLY DISCLAIMS ALL EXPRESS,
of this license with your distribution. If you distribute any portion of
PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO reduce, limit, or restrict any rights arising from fair use, fair dealing, first IMPLIED OR STATUTORY WARRANTIES OR CONDITIONS,
the software in compiled or object code form, you may only do so
EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE sale or other limitations on the exclusive rights of the copyright owner INCLUDING WITHOUT LIMITATION, WARRANTIES OR CONDITIONS
under a license that complies with this license.
DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR under copyright law or other applicable laws. OF MERCHANTABILITY, MERCHANTABLE QUALITY OR FITNESS
E. The software is licensed "as-is." You bear the risk of using it. The FOR A PARTICULAR PURPOSE, OR ANY WARRANTY OF TITLE OR
OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, 3. License Grant. Subject to the terms and conditions of this License,
contributors give no express warranties, guarantees or conditions. NON-INFRINGEMENT, OR THAT THE WORK (OR ANY PORTION
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE the Author hereby grants You a worldwide, royalty-free, non-exclusive,
You may have additional consumer rights under your local laws THEREOF) IS CORRECT, USEFUL, BUG-FREE OR FREE OF
OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. perpetual (for the duration of the applicable copyright) license to
which this license cannot change. To the extent permitted under VIRUSES. YOU MUST PASS THIS DISCLAIMER ON WHENEVER YOU
your local laws, the contributors exclude the implied warranties of exercise the rights in the Work as stated below: DISTRIBUTE THE WORK OR DERIVATIVE WORKS.
Curl License merchantability, fitness for a particular purpose and non- a. You may use the standard version of the Source Code or 7. Indemnity. You agree to defend, indemnify and hold harmless the
infringement. Executable Files in Your own applications.
Copyright (c) 1996 - 2016, Daniel Stenberg, <daniel@haxx.se>, and Author and the Publisher from and against any claims, suits, losses,
b. You may apply bug fixes, portability fixes and other modifications damages, liabilities, costs, and expenses (including reasonable legal or
The Code Project Open License (CPOL) 1.02
many contributors, see the THANKS file.
obtained from the Public Domain or from the Author. A Work attorneys' fees) resulting from or relating to any use of the Work by
All rights reserved.
modified in such a way shall still be considered the standard version You.
Permission to use, copy, modify, and distribute this software for any Copyright (c) 2004..2007 Rob Groves and will be subject to this License. 8. Limitation on Liability. EXCEPT TO THE EXTENT REQUIRED BY
purposewith or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies. Preamble c. You may otherwise modify Your copy of this Work (excluding the APPLICABLE LAW, IN NO EVENT WILL THE AUTHOR OR THE
Articles) in any way to create a Derivative Work, provided that You PUBLISHER BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF This License governs Your use of the Work. This License is intended to insert a prominent notice in each changed file stating how, when SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO allow developers to use the Source Code and Executable Files provided and where You changed that file. EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A as part of the Work in any application in any form. USE OF THE WORK OR OTHERWISE, EVEN IF THE AUTHOR OR
d. You may distribute the standard version of the Executable Files
PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY THE PUBLISHER HAS BEEN ADVISED OF THE POSSIBILITY OF
The main points subject to the terms of the License are: and Source Code or Derivative Work in aggregate with other
RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT SUCH DAMAGES.
• Source Code and Executable Files can be used in commercial (possibly commercial) programs as part of a larger (possibly
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
applications; commercial) software distribution. 9. Termination.
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH • Source Code and Executable Files can be redistributed; and e. The Articles discussing the Work published in any form by the a. This License and the rights granted hereunder will terminate
THE SOFTWARE OR THE USEOR OTHER DEALINGS IN THE author may not be distributed or republished without the Author's automatically upon any breach by You of any term of this License.
• Source Code can be modified to create derivative works.
SOFTWARE. consent. The author retains copyright to any such Articles. You may Individuals or entities who have received Derivative Works from You
• No claim of suitability, guarantee, or any warranty whatsoever is use the Executable Files and Source Code pursuant to this License under this License, however, will not have their licenses terminated
Except as contained in this notice, the name of a copyright holder shall provided. The software is provided "as-is". but you may not repost or republish or otherwise distribute or make provided such individuals or entities remain in full compliance with
not be used in advertising or otherwise to promote the sale, use or other
• The Article accompanying the Work may not be distributed or available the Articles, without the prior written consent of the Author. those licenses. Sections 1, 2, 6, 7, 8, 9, 10 and 11 will survive any
dealings in this Software without prior written authorization of the
republished without the Author's consent Any subroutines or modules supplied by You and linked into the termination of this License.
copyright holder.
Source Code or Executable Files this Work shall not be considered b. If You bring a copyright, trademark, patent or any other
part of this Work and will not be subject to the terms of this License. infringement claim against any contributor over infringements You
claim are made by the Work, your License from such contributor to
the Work ends automatically.
c. Subject to the above terms and conditions, this License is This software is copyright (C) 1991-1998, Thomas G. Lane. All Rights The PHP License, version 3.01 3. All advertising materials mentioning features or use of this software
perpetual (for the duration of the applicable copyright in the Work). Reserved except as specified below. must display the following acknowledgment:
Notwithstanding the above, the Author reserves the right to release Permission is hereby granted to use, copy, modify, and distribute this Copyright (c) 1999 - 2006 The PHP Group. All rights reserved. "This product includes software developed by the OpenSSL Project
the Work under different license terms or to stop distributing the software (or portions thereof) for any purpose, without fee, subject to Redistribution and use in source and binary forms, with or without for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
Work at any time; provided, however that any such election will not these conditions: modification, is permitted provided that the following conditions are met:
serve to withdraw this License (or any other license that has been, 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be
or is required to be, granted under the terms of this License), and (1) If any part of the source code for this software is distributed, then this 1. Redistributions of source code must retain the above copyright used to endorse or promote products derived from this software
this License will continue in full force and effect unless terminated as README file must be included, with this copyright and no-warranty notice, this list of conditions and the following disclaimer. without prior written permission. For written permission, please contact
stated above. notice unaltered; and any additions, deletions, or changes to the original 2. Redistributions in binary form must reproduce the above copyright openssl-core@openssl.org.
files must be clearly indicated in accompanying documentation. notice, this list of conditions and the following disclaimer in the 5. Products derived from this software may not be called "OpenSSL"
10. Publisher. The parties hereby confirm that the Publisher shall not,
under any circumstances, be responsible for and shall not have any (2) If only executable code is distributed, then the accompanying documentation and/or other materials provided with the distribution. nor may "OpenSSL" appear in their names without prior written
liability in respect of the subject matter of this License. The Publisher documentation must state that "this software is based in part on the 3. The name "PHP" must not be used to endorse or promote products permission of the OpenSSL Project.
makes no warranty whatsoever in connection with the Work and shall work of the Independent JPEG Group". derived from this software without prior written permission. For written 6. Redistributions of any form whatsoever must retain the following
not be liable to You or any party on any legal theory for any damages (3) Permission for use of this software is granted only if the user accepts permission, please contact group@php.net. acknowledgment:
whatsoever, including without limitation any general, special, incidental full responsibility for any undesirable consequences; the authors accept "This product includes software developed by the OpenSSL Project
4. Products derived from this software may not be called "PHP", nor
or consequential damages arising in connection to this license. The NO LIABILITY for damages of any kind. for use in the OpenSSL Toolkit (http://www.openssl.org/)"
may "PHP" appear in their name, without prior written permission from
Publisher reserves the right to cease making the Work available to You These conditions apply to any software derived from or based on the IJG group@php.net. You may indicate that your software works in THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS"
at any time without notice code, not just to the unmodified library. If you use our work, you ought to conjunction with PHP by saying "Foo for PHP" instead of calling it AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT
11. Miscellaneous acknowledge us. "PHP Foo" or "phpfoo" NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
a. This License shall be governed by the laws of the location of the Permission is NOT granted for the use of any IJG author's name or 5. The PHP Group may publish revised and/or new versions of the AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
head office of the Author or if the Author is an individual, the laws of company name in advertising or publicity relating to this software or license from time to time. Each version will be given a distinguishing NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS
location of the principal place of residence of the Author. products derived from it. This software may be referred to only as "the version number. Once covered code has been published under a BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
b. If any provision of this License is invalid or unenforceable under Independent JPEG Group's software". particular version of the license, you may always continue to use it EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
applicable law, it shall not affect the validity or enforceability of the We specifically permit and encourage the use of this software as the under the terms of that version. You may also choose to use such NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
remainder of the terms of this License, and without further action by basis of commercial products, provided that all warranty or liability claims covered code under the terms of any subsequent version of the license SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
the parties to this License, such provision shall be reformed to the are assumed by the product vendor. published by the PHP Group. No one other than the PHP Group has INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
minimum extent necessary to make such provision valid and the right to modify the terms applicable to covered code created under LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
ansi2knr.c is included in this distribution by permission of L. Peter this License. (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
enforceable. Deutsch, sole proprietor of its copyright holder, Aladdin Enterprises of
6. Redistributions of any form whatsoever must retain the following OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
c. No term or provision of this License shall be deemed waived and Menlo Park, CA. ansi2knr.c is NOT covered by the above copyright and POSSIBILITY OF SUCH DAMAGE.
no breach consented to unless such waiver or consent shall be in conditions, but instead by the usual distribution terms of the Free acknowledgment:
writing and signed by the party to be charged with such waiver or Software Foundation; principally, that you must include source code if "This product includes PHP software, freely available from {http://www. ====================================================
consent. you redistribute it. (See the file ansi2knr.c for full details.) However, since php.net/software/}". This product includes cryptographic software written by Eric Young
d. This License constitutes the entire agreement between the ansi2knr.c is not needed as part of any program generated from the IJG THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM (eay@cryptsoft.com). This product includes software written by Tim
parties with respect to the Work licensed herein. There are no code, this does not limit you more than the foregoing paragraphs do. "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, Hudson (tjh@cryptsoft.com).
understandings, agreements or representations with respect to the The Unix configuration script "configure" was produced with GNU INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
Work not specified herein. The Author shall not be bound by any Autoconf. It is copyright by the Free Software Foundation but is freely MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE PCRE 5 LICENCE
additional provisions that may appear in any communication from distributable. The same holds for its supporting scripts (config.guess, ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT
You. This License may not be modified without the mutual written config.sub, ltconfig, ltmain.sh). Another support script, install-sh, is TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, PCRE is a library of functions to support regular expressions whose
agreement of the Author and You. copyright by M.I.T. but is also freely distributable. INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL syntax and semantics are as close as possible to those of the Perl 5
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF language.
It appears that the arithmetic coding option of the JPEG spec is covered
The Independent JPEG Group's JPEG software by patents owned by IBM, AT&T, and Mitsubishi. Hence arithmetic SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Release 5 of PCRE is distributed under the terms of the "BSD" licence,
coding cannot legally be used without obtaining one or more licenses. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND as specified below. The documentation for PCRE, supplied in the "doc"
Copyright (C) 1991-1997, Thomas G. Lane. For this reason, support for arithmetic coding has been removed from ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT directory, is distributed under the same terms as the software itself.
README for release 6b of 27-Mar-1998 the free JPEG software. (Since arithmetic coding provides only a LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) Written by: Philip Hazel {ph10@cam.ac.uk}
marginal gain over the unpatented Huffman mode, it is unlikely that very ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
==================================== ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. University of Cambridge Computing Service,
many implementations will support it.) So far as we are aware, there are
This distribution contains the sixth public release of the Independent no patent restrictions on the remaining code. ------------------------------------------------------------------------------------- Cambridge, England. Phone: +44 1223 334714.
JPEG Group's free JPEG software. You are welcome to redistribute this Copyright (c) 1997-2004 University of Cambridge
software and to use it for any purpose, subject to the conditions under The IJG distribution formerly included code to read and write GIF files. To This software consists of voluntary contributions made by many
LEGAL ISSUES, below. avoid entanglement with the Unisys LZW patent, GIF reading support individuals on behalf of the PHP Group. All rights reserved.
has been removed altogether, and the GIF writer has been simplified to The PHP Group can be contacted via Email at group@php.net.
Serious users of this software (particularly those incorporating it into Redistribution and use in source and binary forms, with or without
produce "uncompressed GIFs". This technique does not use the LZW
larger programs) should contact IJG at jpeg-info@uunet.uu.net to be For more information on the PHP Group and the PHP project, please see modification, are permitted provided that the following conditions are
algorithm; the resulting GIF files are larger than usual, but are readable by
added to our electronic mailing list. Mailing list members are notified of {http://www.php.net}. met:
all standard GIF decoders.
updates and have a chance to participate in technical discussions, etc. PHP includes the Zend Engine, freely available at {http://www.zend. • Redistributions of source code must retain the above copyright
We are required to state that notice, this list of conditions and the following disclaimer.
This software is the work of Tom Lane, Philip Gladstone, Jim Boucher, com}.
Lee Crocker, Julian Minguillon, Luis Ortiz, George Phillips, Davide Rossi, "The Graphics Interchange Format(c) is the Copyright property of • Redistributions in binary form must reproduce the above copyright
Guido Vollbeding, Ge' Weijers, and other members of the Independent CompuServe Incorporated. GIF(sm) is a Service Mark property of LICENSE ISSUES notice, this list of conditions and the following disclaimer in the
JPEG Group. CompuServe Incorporated." documentation and/or other materials provided with the distribution.
==============

RSA MD4 or MD5 Message-Digest Algorithm


IJG is not affiliated with the official ISO JPEG standards committee. The OpenSSL toolkit stays under a dual license, i.e. both the conditions • Neither the name of the University of Cambridge nor the names of
LEGAL ISSUES of the OpenSSL License and the original SSLeay license apply to the its contributors may be used to endorse or promote products

============
License toolkit. See below for the actual license texts. Actually both licenses are derived from this software without specific prior written permission.
BSD-style Open Source licenses. In case of any license issues related to THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
In plain English: License to copy and use this software is granted provided that it is OpenSSL please contact openssl-core@openssl.org. CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
identified as the "RSA Data Security, Inc. MD4 or MD5 Message-Digest
1. We don't promise that this software works. (But if you find any bugs, WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
please let us know!)
Algorithm" in all material mentioning or referencing this software or this
function. OpenSSL License WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
2. You can use this software for whatever you want. You don't have to PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
License is also granted to make and use derivative works provided that Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
pay us. such works are identified as "derived from the RSA Data Security, Inc. Redistribution and use in source and binary forms, with or without DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
3. You may not pretend that you wrote this software. If you use it in a MD4 or MD5 Message-Digest Algorithm" in all material mentioning or modification, are permitted provided that the following conditions are CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
program, you must acknowledge somewhere in your documentation referencing the derived work. met: PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
that you've used the IJG code. RSA Data Security, Inc. makes no representations concerning either the USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
1. Redistributions of source code must retain the above copyright
In legalese: merchantability of this software or the suitability of this software for any CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
notice, this list of conditions and the following disclaimer.
particular purpose. It is provided "as is" without express or implied CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
The authors make NO WARRANTY or representation, either express or 2. Redistributions in binary form must reproduce the above copyright
warranty of any kind. OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
implied, with respect to this software, its quality, accuracy, notice, this list of conditions and the following disclaimer in the SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
merchantability, or fitness for a particular purpose. This software is These notices must be retained in any copies of any part of this documentation and/or other materials provided with the distribution. DAMAGE.
provided "AS IS", and you, its user, assume the entire risk as to its quality documentation and/or software.
and accuracy.
NTP License 27. [30]Louis A. Mamakos <louie@ni.umd.edu> MD5-based 23. mailto:phk@FreeBSD.ORG Indemnity
authentication 24. http://www4.informatik.uni-erlangen.de/˜kardel
This file is automatically generated from html/copyright.htm You agree to indemnify and hold harmless the authors of the Software
28. [31]Lars H. Mathiesen <thorinn@diku.dk> adaptation of foundation 25. mailto:Frank.Kardel@informatik.uni-erlangen.de and any contributors for any direct, indirect, incidental, or consequential
Copyright Notice code for Version 3 as specified in RFC-1305
26. mailto:jones@hermes.chpc.utexas.edu third-party claims, actions or suits, as well as any related expenses,
[sheepb.jpg] "Clone me," says Dolly sheepishly 29. [32]David L. Mills <mills@udel.edu> Version 4 foundation: clock liabilities, damages, settlements or fees arising from your use or misuse
discipline, authentication, precision kernel; clock drivers: Spectracom, 27. mailto:dkatz@cisco.com of the Software, or a violation of any terms of this license.
______________________________________________________________ Austron, Arbiter, Heath, ATOM, ACTS, KSI/Odetics; audio clock 28. mailto:leres@ee.lbl.gov
The following copyright notice applies to all files collectively called the drivers: CHU, WWV/H, IRIG 29. mailto:lindholm@ucs.ubc.ca Disclaimer of Warranty
Network Time Protocol Version 4 Distribution. Unless specifically 30. [33]Wolfgang Moeller <moeller@gwdgv1.dnet.gwdg.de> VMS port
declared otherwise in an individual file, this notice applies as if the text 30. mailto:louie@ni.umd.edu THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF
was explicitly included in the file. 31. [34]Jeffrey Mogul <mogul@pa.dec.com> ntptrace utility 31. mailto:thorinn@diku.dk ANY KIND, EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED
Copyright (c) David L. Mills 1992-2001 32. [35]Tom Moore <tmoore@fievel.daytonoh.ncr.com> i386 svr4 port TO, WARRANTIES OF QUALITY, PERFORMANCE, NON-
32. mailto:mills@udel.edu
33. [36]Kamal A Mostafa <kamal@whence.com> SCO OpenServer INFRINGEMENT, MERCHANTABILITY, OR FITNESS FOR A
Permission to use, copy, modify, and distribute this software and its 33. mailto:moeller@gwdgv1.dnet.gwdg.de PARTICULAR PURPOSE.
documentation for any purpose and without fee is hereby granted, port
34. mailto:mogul@pa.dec.com
provided that the above copyright notice appears in all copies and that 34. [37]Derek Mulcahy <derek@toybox.demon.co.uk> and [38]Damon
35. mailto:tmoore@fievel.daytonoh.ncr.com Limitations of Liability
both the copyright notice and this permission notice appear in Hart-Davis <d@hd.org> ARCRON MSF clock driver
supporting documentation, and that the name University of Delaware not 35. [39]Rainer Pruy <Rainer.Pruy@informatik.uni-erlangen.de> 36. mailto:kamal@whence.com YOU ASSUME ALL RISK ASSOCIATED WITH THE INSTALLATION AND
be used in advertising or publicity pertaining to distribution of the monitoring/trap scripts, statistics file handling USE OF THE SOFTWARE. IN NO EVENT SHALL THE AUTHORS OR
37. mailto:derek@toybox.demon.co.uk
software without specific, written prior permission. The University of COPYRIGHT HOLDERS OF THE SOFTWARE BE LIABLE FOR CLAIMS,
Delaware makes no representations about the suitability this software for 36. [40]Dirce Richards <dirce@zk3.dec.com> Digital UNIX V4.0 port 38. mailto:d@hd.org DAMAGES OR OTHER LIABILITY ARISING FROM, OUT OF, OR IN
any purpose. It is provided "as is" without express or implied warranty. 37. [41]Wilfredo Sánchez <wsanchez@apple.com> added support for 39. mailto:Rainer.Pruy@informatik.uni-erlangen.de CONNECTION WITH THE SOFTWARE. LICENSE HOLDERS ARE
The following individuals contributed in part to the Network Time Protocol NetInfo SOLELY RESPONSIBLE FOR DETERMINING THE APPROPRIATENESS
40. mailto:dirce@zk3.dec.com
Distribution Version 4 and are acknowledged as authors of this work. 38. [42]Nick Sayer <mrapple@quack.kfu.com> SunOS streams OF USE AND ASSUME ALL RISKS ASSOCIATED WITH ITS USE,
41. mailto:wsanchez@apple.com INCLUDING BUT NOT LIMITED TO THE RISKS OF PROGRAM
1. [1]Mark Andrews <marka@syd.dms.csiro.au> Leitch atomic clock modules
42. mailto:mrapple@quack.kfu.com ERRORS, DAMAGE TO EQUIPMENT, LOSS OF DATA OR SOFTWARE
controller 39. [43]Jack Sasportas <jack@innovativeinternet.com> Saved a Lot of PROGRAMS, OR UNAVAILABILITY OR INTERRUPTION OF
space on the stuff in the html/pic/ subdirectory 43. mailto:jack@innovativeinternet.com
2. [2]Bernd Altmeier <altmeier@atlsoft.de> hopf Elektronik serial line OPERATIONS.
and PCI-bus devices 40. [44]Ray Schnitzler <schnitz@unipress.com> Unixware1 port 44. mailto:schnitz@unipress.com
3. [3]Viraj Bais <vbais@mailman1.intel.com> and [4]Clayton Kirkwood 41. [45]Michael Shields <shields@tembel.org> USNO clock driver 45. mailto:shields@tembel.org GLUT for Win32 License
<kirkwood@striderfm.intel.com> port to WindowsNT 3.5 42. [46]Jeff Steinman <jss@pebbles.jpl.nasa.gov> Datum PTS clock 46. mailto:pebbles.jpl.nasa.gov
The OpenGL Utility Toolkit distribution for Win32 (Windows NT &
4. [5]Michael Barone <michael,barone@lmco.com> GPSVME fixes driver 47. mailto:harlan@pfcs.com Windows 95) contains source code modified from the original source
5. [6]Karl Berry <karl@owl.HQ.ileaf.com> syslog to file option 43. [47]Harlan Stenn <harlan@pfcs.com> GNU automake/ 48. mailto:ken@sdd.hp.com code for GLUT version 3.3 which was developed by Mark J. Kilgard. The
6. [7]Greg Brackley <greg.brackley@bigfoot.com> Major rework of autoconfigure makeover, various other bits (see the ChangeLog) original source code for GLUT is Copyright 1997 by Mark J. Kilgard.
49. mailto:ajit@ee.udel.edu
WINNT port. Clean up recvbuf and iosignal code into separate 44. [48]Kenneth Stone <ken@sdd.hp.com> HP-UX port GLUT for Win32 is Copyright 1997 by Nate Robins and is not in the
modules. 50. mailto:tsuruoka@nc.fukuoka-u.ac.jp
45. [49]Ajit Thyagarajan <ajit@ee.udel.edu>IP multicast/anycast public domain, but it is freely distributable without licensing fees.
7. [8]Marc Brett <Marc.Brett@westgeo.com> Magnavox GPS clock 51. mailto:vixie@vix.com
support It is provided without guarantee or warrantee expressed or implied.
driver 52. mailto:Ulrich.Windl@rz.uni-regensburg.de
46. [50]Tomoaki TSURUOKA <tsuruoka@nc.fukuoka-u.ac.jp>TRAK It was ported with the permission of Mark J. Kilgard by Nate Robins.
8. [9]Piete Brooks <Piete.Brooks@cl.cam.ac.uk> MSF clock driver, clock driver 53. file://localhost/backroom/ntp-stable/html/index.htm
THIS SOURCE CODE IS PROVIDED "AS IS" WITHOUT WARRANTY OF
Trimble PARSE support 47. [51]Paul A Vixie <vixie@vix.com> TrueTime GPS driver, generic 54. mailto:mills@udel.edu ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT
9. [10]Reg Clemens <reg@dwf.com> Oncore driver (Current TrueTime clock driver LIMITED TO, THE IMPLIED WARRANTIES OR MERCHANTABILITY OR
maintainer) 48. [52]Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> corrected CodeIgniter License Agreement FITNESS FOR A PARTICULAR PURPOSE.
10. [11]Steve Clift <clift@ml.csiro.au> OMEGA clock driver and validated HTML documents according to the HTML DTD OpenGL (R) is a registered trademark of Silicon Graphics, Inc.
Copyright (c) 2008 - 2009, EllisLab, Inc.
11. [12]Casey Crellin <casey@csc.co.za> vxWorks (Tornado) port and [53]gif
help with target configuration [54]David L. Mills <mills@udel.edu>
All rights reserved. ISC License
12. [13]Sven Dietrich <sven_dietrich@trimble.com> Palisade reference This license is a legal agreement between you and EllisLab Inc. for the
References use of CodeIgniter Software (the "Software"). By obtaining the Software Copyright (c) 2004-2013 by Internet Systems Consortium, Inc. ("ISC")
clock driver, NT adj. residuals, integrated Greg's Winnt port.
1. mailto:marka@syd.dms.csiro.au you agree to comply with the terms and conditions of this license. Copyright (c) 1995-2003 by Internet Software Consortium
13. [14]John A. Dundas III <dundas@salt.jpl.nasa.gov> Apple A/UX
2. mailto:altmeier@atlsoft.de Permission to use, copy, modify, and distribute this software for any
port
Permitted Use purpose with or without fee is hereby granted, provided that the above
14. [15]Torsten Duwe <duwe@immd4.informatik.uni-erlangen.de> 3. mailto:vbais@mailman1.intel.co
You are permitted to use, copy, modify, and distribute the Software and copyright notice and this permission notice appear in all copies.
Linux port 4. mailto:kirkwood@striderfm.intel.com
its documentation, with or without modification, for any purpose, THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL
15. [16]Dennis Ferguson <dennis@mrbill.canet.ca> foundation code 5. mailto:michael.barone@lmco.com provided that the following conditions are met: WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
for NTP Version 2 as specified in RFC-1119
6. mailto:karl@owl.HQ.ileaf.com 1. A copy of this license agreement must be included with the IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN
16. [17]Glenn Hollinger <glenn@herald.usask.ca> GOES clock driver NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
7. mailto:greg.brackley@bigfoot.com distribution.
17. [18]Mike Iglesias <iglesias@uci.edu> DEC Alpha port INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
8. mailto:Marc.Brett@westgeo.com 2. Redistributions of source code must retain the above copyright WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
18. [19]Jim Jagielski <jim@jagubox.gsfc.nasa.gov> A/UX port notice in all source code files. PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
9. mailto:Piete.Brooks@cl.cam.ac.uk
19. [20]Jeff Johnson <jbj@chatham.usdesign.com> massive 3. Redistributions in binary form must reproduce the above copyright OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
10. mailto:reg@dwf.com
prototyping overhaul notice in the documentation and/or other materials provided with the CONNECTION WITH THE USE OR PERFORMANCE OF THIS
11. mailto:clift@ml.csiro.au distribution. SOFTWARE.
20. [21]Hans Lambermont <Hans.Lambermont@nl.origin-it.com> or
[22]<H.Lambermont@chello.nl> ntpsweep 12. mailto:casey@csc.co.za 4. Any files that have been modified must carry notices stating the Internet Systems Consortium, Inc.
21. [23]Poul-Henning Kamp <phk@FreeBSD.ORG> Oncore driver 13. mailto:Sven_Dietrich@trimble.COM nature of the change and the names of those who changed them. 950 Charter Street
(Original author) 14. mailto:dundas@salt.jpl.nasa.gov 5. Products derived from the Software must include an Redwood City, CA 94063
22. [24]Frank Kardel [25]<Frank.Kardel@informatik.uni-erlangen.de> 15. mailto:duwe@immd4.informatik.uni-erlangen.de acknowledgment that they are derived from CodeIgniter in their
documentation and/or other materials provided with the distribution. <info@isc.org>
PARSE <GENERIC> driver (14 reference clocks), STREAMS modules 16. mailto:dennis@mrbill.canet.ca https://www.isc.org/
for PARSE, support scripts, syslog cleanup 6. Products derived from the Software may not be called "CodeIgniter",
17. mailto:glenn@herald.usask.ca nor may "CodeIgniter" appear in their name, without prior written
23. [26]William L. Jones <jones@hermes.chpc.utexas.edu> RS/6000 permission from EllisLab, Inc.
18. mailto:iglesias@uci.edu
AIX modifications, HPUX modifications
19. mailto:jagubox.gsfc.nasa.gov
24. [27]Dave Katz <dkatz@cisco.com> RS/6000 AIX port
20. mailto:jbj@chatham.usdesign.com
25. [28]Craig Leres <leres@ee.lbl.gov> 4.4BSD port, ppsclock,
Magnavox GPS clock driver 21. mailto:Hans.Lambermont@nl.origin-it.comv
26. [29]George Lindholm <lindholm@ucs.ubc.ca> SunOS 5.1 port 22. mailto:H.Lambermont@chello.nl
Brian Gladman Alternate License
Copyright (c) 2003, 2010 Brian Gladman, Worcester, UK. All rights
reserved.

LICENSE TERMS
The free distribution and use of this software in both source and binary
form is allowed (with or without changes) provided that:
1. distributions of this source code include the above copyright notice,
this list of conditions and the following disclaimer;
2. distributions in binary form include the above copyright notice, this
list of conditions and the following disclaimer in the documentation
and/or other associated materials;
3. the copyright holder's name is not used to endorse products built
using this software without specific written permission.
ALTERNATIVELY, provided that this notice is retained in full, this product
may be distributed under the terms of the GNU General Public License
(GPL), in which case the provisions of the GPL apply INSTEAD OF those
given above.

DISCLAIMER
This software is provided 'as is' with no explicit or implied warranties in
respect of its properties, including, but not limited to, correctness and/or
fitness for purpose.

Hanwha Techwin cares for the environment at all product manufacturing stages, and is taking measures to provide
customers with more environmentally friendly products.
The Eco mark represents Hanwha Techwin's devotion to creating environmentally friendly products, and indicates
that the product satisfies the EU RoHS Directive.

Correct Disposal of This Product (Waste Electrical & Electronic Equipment)


(Applicable in the European Union and other European countries with separate collection systems)
This marking on the product, accessories or literature indicates that the product and its electronic accessories (e.g. charger, headset, USB
cable) should not be disposed of with other household waste at the end of their working life. To prevent possible harm to the environment
or human health from uncontrolled waste disposal, please separate these items from other types of waste and recycle them responsibly
to promote the sustainable reuse of material resources.
Household users should contact either the retailer where they purchased this product, or their local government office, for details of
where and how they can take these items for environmentally safe recycling.
Business users should contact their supplier and check the terms and conditions of the purchase contract. This product and its electronic
accessories should not be mixed with other commercial wastes for disposal.

Correct disposal of batteries in this product


(Applicable in the European Union and other European countries with separate battery return systems.)

This marking on the battery, manual or packaging indicates that the batteries in this product should not be disposed of with other household waste at the end of their
working life. Where marked, the chemical symbols Hg, Cd or Pb indicate that the battery contains mercury, cadmium or lead above the reference levels in EC Directive
2006/66. If batteries are not properly disposed of, these substances can cause harm to human health or the environment.
To protect natural resources and to promote material reuse, please separate batteries from other types of waste and recycle them through your local, free battery
return system.
Head Office
6, Pangyo-ro 319 beon-gil, Bundang-gu, Seongnam-si,
Gyeonggi-do, 463-400 Rep. of KOREA
Tel : +82.70.7147.8753 Fax : +82.31.8018.3740
www.hanwha-security.com

Hanwha Techwin America


500 Frank W. Burr Blvd. Suite 43 Teaneck, NJ 07666
Toll Free +1.877.213.1222 Direct +1.201.325.6920
Fax +1.201.373.0124
www.hanwha-security.com

Hanwha Techwin Europe


Heriot House, Heriot Road, Chertsey, Surrey, KT16 9DT, United Kingdom
Tel +44.1932.57.8100 Fax +44.1932.57.8101
www.hanwha-security.eu

Das könnte Ihnen auch gefallen